Invention Grant
US08307441B2 Log-based traceback system and method using centroid decomposition technique
有权
基于Log的追溯系统和使用重心分解技术的方法
- Patent Title: Log-based traceback system and method using centroid decomposition technique
- Patent Title (中): 基于Log的追溯系统和使用重心分解技术的方法
-
Application No.: US12669633Application Date: 2007-11-21
-
Publication No.: US08307441B2Publication Date: 2012-11-06
- Inventor: Jong Hyun Kim , Geon Lyang Kim , Seon Gyoung Sohn , Beom Hwan Chang , Chi Yoon Jeong , Jong Ho Ryu , Jung Chan Na , Jong Soo Jang , Sung Won Sohn
- Applicant: Jong Hyun Kim , Geon Lyang Kim , Seon Gyoung Sohn , Beom Hwan Chang , Chi Yoon Jeong , Jong Ho Ryu , Jung Chan Na , Jong Soo Jang , Sung Won Sohn
- Applicant Address: KR Daejeon
- Assignee: Electronics and Telecommunications Research Institute
- Current Assignee: Electronics and Telecommunications Research Institute
- Current Assignee Address: KR Daejeon
- Agency: Kile Park Goekjian Reed & McManus PLLC
- Priority: KR10-2007-0073059 20070720
- International Application: PCT/KR2007/005859 WO 20071121
- International Announcement: WO2009/014283 WO 20090129
- Main IPC: G06F11/34
- IPC: G06F11/34

Abstract:
There are provided a system and method for tracing back an attacker by using centroid decomposition technique, the system including: a log data input module collecting log data of an intrusion alarm from an intrusion detection system; a centroid node detection module generating a shortest path tree by applying a shortest path algorithm to network router connection information collected by a network administration server, detecting a centroid node by applying centroid decomposition technique removing a leaf-node to the shortest path tree, and generating a centroid tree whose node of each level is the detected centroid node; and a traceback processing module requesting log data of a router matched with the node of each level of the centroid tree, and tracing back a router identical to the log data of the collected intrusion alarm as a router connected to a source of an attacker by comparing the log data of the router with the log data of the collected intrusion alarm. According to the system and method, an attacker causing a security intrusion event may be quickly detected, a load on the system is reduced, and a passage host exposed to a danger or having weaknesses may be easily recognized, thereby easily coping with an attack.
Public/Granted literature
- US20100212013A1 LOG-BASED TRACEBACK SYSTEM AND METHOD USING CENTROID DECOMPOSITION TECHNIQUE Public/Granted day:2010-08-19
Information query