New Behavioral Data System Could Do Double Duty

May 07, 2010

(PhysOrg.com) -- A new behavioral data analysis system under development at UT Dallas focuses on identifying potential Internet threats, but it comes with a nice bonus.

Researchers say the basic idea behind the system - detecting worrisome deviations from normal activity and quickly providing an alert so that immediate measures can be taken - could have application in areas far beyond the Web, such as health-care monitoring.

“We proposed a novel platform that thoroughly analyzes network traffic behavior to identify potential internet threats,” said Dr. Mehrdad Nourani, an associate professor of in the University’s Erik Jonsson School of Engineering and . “But it could have much broader application.”

The technology uses two sub-systems functioning in parallel to achieve both high speed and efficient use of memory, thus ensuring fast results and optimal use of resources. The system builds a bell-shaped curve depicting normal traffic/behavior and can then achieve practically zero false positives and false negatives when identifying abnormalities outside the curve.

The happy result is that although the system is designed to identify abnormalities that indicate suspicious interactions among users or the presence of malicious data such as worms or viruses, the abnormality might just as well be health-related data indicating an issue such as heart arrhythmia, sleep apnea or epileptic seizure.

Titled “A Behavioral Analysis Engine for Network Traffic,” the two-year $100,000 project is funded by the Cisco University Research Program Fund, a corporate advised fund of the Community Foundation.

Explore further: Coping with floods—of water and data

add to favorites email to friend print save as pdf

Related Stories

Cisco releases Web security app for iPhone

Nov 20, 2009

Cisco on Friday announced the release of a free iPhone application for anyone who wants to stay on top of the latest trojans, worms, or other threats marauding on the Internet.

F-Secure buys out ROMmon

Nov 30, 2005

F-Secure launched Wednesday a new system to protect Internet service providers from network abuse by buying out ROMmon.

Silicon Valley cuts the Internet cord

Sep 07, 2006

Some 2.4 million residents of California's Silicon Valley will have free broadband wireless Internet access when a new network goes on line. The system will be put together by Silicon Valley Metro Connect, a collaboration ...

Improving network firewalls

Apr 16, 2010

A firewall is the safety barrier between a computer network and the outside world. Individuals, companies and large organizations alike rely on a firewall being robust enough to fend off hackers attempting to break into a ...

The phony goat gets the worm

Mar 28, 2006

IBM researchers have designed a new way to detect and thwart attacks on computer networks. Code named "Billy Goat," the intrusion detection tool provides both early detection of worm attacks and fewer false alarms than other ...

Recommended for you

Coping with floods—of water and data

Dec 19, 2014

Halloween 2013 brought real terror to an Austin, Texas, neighborhood, when a flash flood killed four residents and damaged roughly 1,200 homes. Following torrential rains, Onion Creek swept over its banks and inundated the ...

Cloud computing helps make sense of cloud forests

Dec 17, 2014

The forests that surround Campos do Jordao are among the foggiest places on Earth. With a canopy shrouded in mist much of time, these are the renowned cloud forests of the Brazilian state of São Paulo. It is here that researchers ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.