In one embodiment of a method and apparatus for predicting and preventing
network attacks, data is collected from network devices during an attack.
The collected data is analyzed to identify specific temporal precursors
of the attack. The future network activity is then monitored for the
presence of the identified temporal attack precursors. When the presence
of a precursor is detected, appropriate protective action is taken.
Preferably, all steps in this process occur automatically. In the
preferred embodiment, the process is performed under the control of one
or more network or element management systems. The possible network
domain includes data, voice, and video networks and multiple,
interconnected network technologies. In one embodiment, triggers
responsive to the presence of the identified precursors are placed into a
network or element management system. The preferred embodiment of the
invention utilizes machine-learning algorithms for discovering precursors
of attacks, but any suitable algorithm may be used. The invention may be
used in "attack autopsy" mode only, monitoring mode only, or both. Among
other uses, the invention allows integration of Intrusion Detection
Systems with Network Management Systems.