System and method to detect attacks on mobile wireless networks based on network controllability analysis
First Claim
Patent Images
1. A system for detecting and mitigating attacks of misinformation on communication networks, the system comprising:
- one or more processors and a non-transitory memory having instructions encoded thereon such that when the instructions are executed, the one or more processors perform operations of;
computing a plurality of network controllability metrics on a representation of a communication network comprising a plurality of nodes;
detecting changes in the plurality of network controllability metrics;
using the detected changes to detect an attack of misinformation on the communication network, wherein given a set of examples of network controllability metric data representing a baseline behavior and a set of examples of network controllability metric data representing an attack behavior, a machine learning classifier determines a threshold for attack detection based on differences between the baseline behavior and the attack behavior;
attributing the attack to an attacking node in the communication network; and
performing a mitigation action that isolates the attacking node from the communication network.
1 Assignment
0 Petitions
Accused Products
Abstract
Described is a system for detecting attacks of misinformation on communication networks. Network controllability metrics on a graphical representation of a communication network are computed. Changes in the network controllability metrics are detected, and attack of misinformation on the communication network are detected based on the detected changes in the network controllability metrics.
25 Citations
16 Claims
-
1. A system for detecting and mitigating attacks of misinformation on communication networks, the system comprising:
-
one or more processors and a non-transitory memory having instructions encoded thereon such that when the instructions are executed, the one or more processors perform operations of; computing a plurality of network controllability metrics on a representation of a communication network comprising a plurality of nodes; detecting changes in the plurality of network controllability metrics; using the detected changes to detect an attack of misinformation on the communication network, wherein given a set of examples of network controllability metric data representing a baseline behavior and a set of examples of network controllability metric data representing an attack behavior, a machine learning classifier determines a threshold for attack detection based on differences between the baseline behavior and the attack behavior; attributing the attack to an attacking node in the communication network; and performing a mitigation action that isolates the attacking node from the communication network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method for detecting and mitigating attacks of misinformation on communication networks, comprising:
-
an act of causing one or more processors to execute instructions stored on a non-transitory memory such that upon execution, the one or more processors perform operations of; computing a plurality of network controllability metrics on a representation of a communication network comprising a plurality of nodes; detecting changes in the plurality of network controllability metrics; using the detected changes to detect an attack of misinformation on the communication network, wherein given a set of examples of network controllability metric data representing a baseline behavior and a set of examples of network controllability metric data representing an attack behavior, a machine learning classifier determines a threshold for attack detection based on differences between the baseline behavior and the attack behavior; attributing the attack to an attacking node in the communication network; and performing a mitigation action that isolates the attacking node from the communication network. - View Dependent Claims (10, 11, 12)
-
-
13. A computer program product for detecting and mitigating attacks of misinformation on communication networks, the computer program product comprising:
-
computer-readable instructions stored on a non-transitory computer-readable medium that are executable by a computer having one or more processors for causing the processor to perform operations of; computing a plurality of network controllability metrics on a representation of a communication network comprising a plurality of nodes; detecting changes in the plurality of network controllability metrics; using the detected changes to detect an attack of misinformation on the communication network, wherein given a set of examples of network controllability metric data representing a baseline behavior and a set of examples of network controllability metric data representing an attack behavior, a machine learning classifier determines a threshold for attack detection based on differences between the baseline behavior and the attack behavior; attributing the attack to an attacking node in the communication network; and performing a mitigation action that isolates the attacking node from the communication network. - View Dependent Claims (14, 15, 16)
-
Specification