Abstract:
PURPOSE: A cyber security event information management device and a method thereof are provided to guarantee anonymity by converting internet protocol address information into virtual information. CONSTITUTION: A security event generation system(100) of one or more clients outputs security event information generated by a security solution by using a client converter. A security event collecting and integrated management unit(200) of a server collects the security event information generated from the security event generation system by using a server converter. The security event collecting and integrated management unit of the server outputs new type security event information by converting the collected security event information. [Reference numerals] (100) Security event generation system 1; (110,BB,DD) Client converter; (200) Security event collecting and integrating management unit; (210) Server converter; (AA) Security event generation system 2; (CC) Security event generation system N; (EE) Internet
Abstract:
PURPOSE: A method and a system for managing network attacks and a device for providing network services for managing the network attacks are provided to support a service user to search and use adequate services. CONSTITUTION: A client terminal(100) searches detecting/responding information to network attacks and shares network attack information based on a service registry. A network service providing device(300) collects, analyzes, and manages the detecting/responding information and registers the detecting/responding information to the service registry. An authentication service providing device(400) transmits the authentication result of the client terminal to the service registry according to the service searching request of the client terminal or the authenticating request of the network service providing device.
Abstract:
PURPOSE: A division service attach traffic control device based on a connection history and a method thereof are provided to protect a network source and a server system source. CONSTITUTION: A network monitoring unit(202) detects whether DDoS(Distributed Denial of Service) attack occurs or not in advance. A harmful inspection unit(212) sets a priority per source address. A block unit(218) controls traffic by priority information if it is determined that a DDoS attack has occurred.
Abstract:
PURPOSE: A correlation analysis apparatus and method thereof based on malicious file informaiton on network are provided to recognize a malicious code path and scenario based on file informaiton that is collected on network. CONSTITUTION: A scenario definition table(104) is composed on the malicious code propagation path of one or more scenarios. A correlation definition table(106) is composed of a correlation condition based on traffic characteristic. A post decision process unit produces the malicious probability value about each concern file through comparison between the traffic information table and the scenario definition table.
Abstract:
A system and a method for managing and distributing an enterprise signature for network attacks are provided to manage each complicated security management system consistently based on a signature generated from a security system which generates signatures. A signature collector(100) classifies signatures generated from the each security system, which generates signatures, according to the information including each signature. In addition, the signature collector collects the signatures in analyzable internal structure form. In order to increase reliability, a signature analyzer analyzes the collected signatures. A signature distributing unit(400) distributes the analyzed signature to a security management system on other networks through a signature distribution protocol(600).
Abstract:
An apparatus and a method for preventing intrusion based on alert severity of signature detection and abnormal traffic are provided to calculate exact reliability of the alert severity of an abnormal traffic detecting sensor by using attack alerts collected form different kinds of detecting sensors, thereby properly dealing with the intrusion with respect to the abnormal traffic. A preprocessor(120) classifies attack alerts each having reliability and alarm severity, collected from different plural attack pattern detecting sensors(101) and an abnormal traffic detecting sensor(105), according to generation time and calculates a reference value showing consistency of attack alerts having the same generation time. A reliability calculator(130) calculates reliability of alarm severity of attack alerts generated by the abnormal traffic detecting sensor based on at least one of the reference value and alert severity of the attack alerts generated at the same time. A reliability calculator(130) calculates the reliability of alarm risk for an attack alarm, which is generated by the abnormal traffic detecting sensor, based on at least one of either the reference value calculated by the preprocessor or the alarm risk for attack alarms which occur at the same time.
Abstract:
본 발명은 네트워크 세션 특성 정보에 대한 공격행위 탐지규칙 자동생성 및 자동갱신 방법 및 장치에 관한 것으로, 세션 특성 정보별로 분류된 네트워크 데이터를 세션 특성 정보 및 정상 유형, 공격 유형 및 미지 유형 중 네트워크 데이터가 속하는 네트워크 데이터 유형의 특성을 포함하는 입력 데이터 형식으로 변환하는 네트워크 세션 특성정보 추출부 및 입력 데이터 형식으로 변환된 네트워크 데이터에 확장 C4.5 알고리즘을 적용하여 결정트리를 구성하고, 결정트리의 최종노드에서 오류율을 기초로 결정트리의 정확도를 생성하며, 네트워크 데이터 유형의 특성, 결정트리의 최적의 정보이득을 갖는 노드를 선택하기 위한 조건식 및 정확도를 기초로 네트워크 데이터 유형별로 패턴화된 탐지규칙을 생성하는 탐지규칙 자동 생성부를 포함하여 탐지규칙을 자동으로 생성하고 갱신한다. 네트워크 세션 특성 정보, 탐지규칙, 결정트리, 자동생성, 자동갱신
Abstract:
본 발명은 네트워크 공격의 통합 시그니처 관리 및 분배 시스템 및 방법에 관한 것으로 본 발명에 따른 네트워크 공격의 통합 시그니처 관리 및 분배 시스템은 분산 네트워크 환경 하에서 다수의 시그니처 생성 보안 시스템들에 의해 생성되는 시그니처를 통합 관리하는 네트워크 공격의 통합 시그니처 관리 및 분배 시스템으로서, 상기 각각의 시그니처 생성 보안 시스템으로부터 생성되는 시그니처를 각각의 시그니처가 포함하는 정보에 따라 분류하여 분석 가능한 내부구조체 형태로 수집하는 시그니처 수집기; 상기 수집된 시그니처를 신뢰성이 향상되도록 분석하는 시그니처 분석기; 및 상기 분석된 시그니처를 시그니처 분배 프로토콜을 통하여 다른 네트워크 상의 보안 관리 시스템으로 분배하는 시그니처 분배기; 를 포함하는 것을 특징으로 한다. 시그니처, 정규화, 통합, 분배, 관리, 보안
Abstract:
An apparatus for analyzing and coping with an intrusion situation and a method for expressing attack detection alarms as an N-dimensional correlation graph are provided to enable a manager to intuitively recognize and cope with an intrusion situation by expressing an attack situation, its stages, and correlated attacks as a two or three-dimensional graph. An apparatus for analyzing and coping with an intrusion situation comprises the first analysis part(107) and the second analysis part(109). The first analysis part collects attack detection alarms from network alarm devices, classifies them, and expresses results as a three-dimensional graph. The second analysis part receives the results, executes vector conversion to project the three-dimensional graph onto a two-dimensional graph, and analyzes the correlations of attacks. The first analysis part comprises an attack detection alarm collection part, a classification part, and an N-dimensional express analysis part. The attack detection alarm collection part collects attack detection alarms. The classification part classifies the collected attack detection alarms according to attack stages and attack situations. The N-dimensional express analysis part outputs each classified attack stage as a three-dimensional graph.