System for intrusion detection
First Claim
Patent Images
1. A system for operating a wireless ad hoc network, said system comprising:
- a plurality of nodes for transmitting data therebetween as governed by at least one of a plurality of protocols; and
a complexity probe that quantifies a complexity of the transmissions of data with a complexity metric and determines from the quantified complexity whether an external source has altered the operation of the system, wherein a first complexity metric of a first protocol is compared to a first benchmarked complexity metric indicating normal operation of said first protocol, and wherein the first complexity metric of said first protocol is a Kolmogorov complexity metric.
2 Assignments
0 Petitions
Accused Products
Abstract
A system a wireless ad hoc network. The system includes a plurality of nodes and a plurality of protocols for governing transmission of data between the plurality of nodes. The operation of the protocols is quantified by a complexity metric for determining whether an external source has altered the operation of the system.
-
Citations
13 Claims
-
1. A system for operating a wireless ad hoc network, said system comprising:
-
a plurality of nodes for transmitting data therebetween as governed by at least one of a plurality of protocols; and a complexity probe that quantifies a complexity of the transmissions of data with a complexity metric and determines from the quantified complexity whether an external source has altered the operation of the system, wherein a first complexity metric of a first protocol is compared to a first benchmarked complexity metric indicating normal operation of said first protocol, and wherein the first complexity metric of said first protocol is a Kolmogorov complexity metric. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer readable medium comprising:
-
a computer-usable data carrier storing instructions, the instructions when executed by a computer system causing the computer system to determine whether an external system has altered the operation of the computer system by executing the instructions to; quantify a complexity of at least one of a plurality of transmissions between nodes of the computer system with a complexity metric; determine from the quantified complexity whether an external source has altered the operation of the network; and compare a first complexity metric of a first protocol to a first benchmarked complexity metric indicating normal operation of the first protocol, wherein the first complexity metric of the first protocol is a Kolmogorov complexity metric. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method for operating a network having a plurality of nodes, data transmission between the nodes being governed by at least one of a plurality of protocols, said method comprising:
-
quantifying a complexity of the data transmissions between the nodes by a complexity metric; and determining whether an external source has altered the operation of the network based on the quantified complexity; and comparing a complexity metric of the data transmissions to a benchmarked complexity metric indicating normal operation of the protocol, wherein the complexity metric is a Kolmogorov complexity metric. - View Dependent Claims (12, 13)
-
Specification