Abstract:
본 발명은 시그니처 최적화 시스템 및 방법에 관한 것으로, 패킷 단위로 시그니처 생성 시 사용된 패킷을 수집하여 시그니처가 포함된 패킷 플로우에 공격 징후가 존재하는지 확인하고, 확인된 공격 징후 별로 최종 시그니처를 생성하도록 한다. 본 발명에 따르면, 하나의 공격 징후에 대해 생성되는 시그니처의 수를 최소화함으로써 시그니처 기반 보안 제품의 메모리 자원을 절약하게 되는 이점이 있다. 또한, 시그니처를 선별하기 위한 시간을 단축함에 따라 생성된 시그니처를 적용하는데 걸리는 시간을 단축할 수 있는 이점이 있다. 패킷, 시그니처 생성수단, 시그니처 최적화수단
Abstract:
본 발명의 일실시 형태에 따른 중심점 분할(Centroid Decomposition) 기법을 이용하여 공격자를 역추적하는 시스템 및 방법에 관한 것으로, 침입탐지 시스템으로부터 침입경보의 로그 정보(log data)를 수집하는 로그정보입력모듈; 망 관리서버에서 수집한 네트워크 라우터의 연결정보에 대해 최단 경로 알고리즘을 적용하여 최단 경로 트리를 생성하고, 상기 최단 경로 트리의 리프노드를 제거하는 중심점 분할 기법(centroid decomposition technique)을 적용하여 센트로이드 노드(centroid node)를 검출하고, 상기 검출한 센트로이드 노드를 각 레벨의 노드로 하는 센트로이드 트리를 생성하는 센트로이드노드검출모듈; 및 상기 센트로이드 트리의 각 레벨의 노드에 대해 매칭되는 라우터의 로그 정보를 요청해서 상기 수집한 침입경보의 로그 정보와 센트로이드 트리의 각 레벨별로 순차적으로 비교하여 일치하는 공격자의 근원지에 연결된 라우터를 역추적하는 역추적처리모듈을 포함하여 구성됨으로써, 보안침해사고를 일으키는 공격자를 빠르게 찾아낼 수 있으며, 역추적 시스템의 부하를 줄이고, 위협 혹은 취약점이 노출되어 있는 경유 호스트를 쉽게 파악할 수 있으므로 공격에 대한 대응이 용이하다는 효과가 있다. 중심점 분할 기법, 침입 탐지, 로그 기반, 역추적
Abstract:
본 발명은 영상 정보 처리 장치 및 방법에 관한 것이다. 본 영상 정보 처리 장치는, 영상을 촬영하는 영상 촬영장치, 및 영상 촬영장치가 촬영한 영상을 수신하여 저장하는 영상 정보 서버를 포함하고, 영상 촬영장치가 수집한 영상 데이터에 영상 촬영장치의 정보 및 서명정보를 추가한다. 본 발명에 따르면, 영상 촬영장치가 수집한 영상 데이터에 장치 정보 및 서명정보를 추가함으로써 영상 데이터의 보안을 유지하고, 특정 사건이 발생하는 경우 영상 데이터를 디지털 증거물로서 활용할 수 있다. 영상 데이터, 서명정보, 공개키, 대칭 키
Abstract:
A database processing method through partial order conservation inside a bucket for safely encrypting numerical data is provided to supply a search result in database search about the stored data. A relative value of a plaintext is calculated in a bucket in which the plaintext is allocated(S204). The random number is generated in bucket by generating a first primary key value(S206). The second key value defining the function which the bucket range is used for input is generated(S208). The transformed relative value is stored according to the first primary key value and the second key value the relative value is converted so that the relative value of the plaintext partly maintain the order(S216).
Abstract:
A video information processing apparatus and a method thereof are provided to efficiently maintain security of video data, and to use an image taken for a particular case as a digital piece of evidence. A video photographing device(110) takes an image. A video information server(120) receives the image taken by the video photographing device, and stores the received image. The video photographing device comprises as follows. Video devices(112-116) convert optimal images into image data. A video processor inserts signature information and device information of the video photographing device into the image data. The video processor comprises as follows. A device information processor receives the device information to insert the device information into the image data.
Abstract:
A signature string storing memory optimizing method, a memory structure thereof, and a signature string pattern matching method are provided to divide search patterns into tokens of predetermined size and arrange the tokens properly in an inner memory block and an external memory block, thereby applying the maximum search patterns in the minimum memory area. Tokenization is performed. The tokenization is conversion from a signature string pattern to a sub string. It is determined whether a sub string to be stored is the same as another signature sub stream(S110). It is determined whether a sub string to be stored is the first sub string(S160). The sub string is stored in an inner memory block(S170). It is determined whether a memory table storing a previous sub string is linked to a memory table storing a sub string of the next location(S180). The sub string to be stored is stored in an external memory block(S200).
Abstract:
A signature pattern matching method, a system for the same and a computer readable medium storing a signature pattern are provided to reduce the amount of memory use by minimizing a memory access time based on the usage of a bloom filter. The sub string of a traffic packet is extracted(S100), and a hash value is obtained by applying a hash function to the extracted sub string(S110). A pre-filtering that checks membership is performed(S120), and a bloom filter which is supposed to be compared with a currently-obtained harsh value is queried(S130). It is checked over whether or not a pattern matched with the queried bloom filter exists(S140), and it is checked over whether or not a signature completion filed is included to the sub string of the matched signature pattern(S150).
Abstract:
A confidence information management system based on a receipt and a method thereof in P2P network providing the reliability information of peers are provided to calculate reliability based on the issue of receipt information by a confidence information management server. A receipt receiving unit(101b) receives receipt information encrypted as a private key of a peer A from a peer B in order to prevent the forgery of the receipt encrypted by the private key B. A reliability management unit(101c) calculates the reliability value by using receipt issue information and is encrypted by the private key of A and the receipt information and is encrypted by the private key of B. The reliability administration unit updates and manages the reliability information of peers. A reliability information providing unit(101e) transmits reliability information of the peer B encrypted as a private key of the reliability information providing unit.
Abstract:
An authentication gateway apparatus for accessing a ubiquitous service and a method thereof are provided to authenticate an authentication server and an authentication gateway of a service provider by using a first authentication device as an authentication gateway. A first authentication device(100) transmits an authentication data request message to an authentication server(110) of a service provider. The first authentication device stores an authentication token received from the authentication server. The first authentication device performs an authentication gateway role with second authentication devices of a plurality of other service providing devices(120a~120d). The service providing devices are connected to a portable device through a wireless communication method. A plurality of second authentication devices(170a~170d) provides an eigenvalue of the second authentication device to the first authentication devices through the wireless communication method.
Abstract:
A P2P traffic management apparatus and a method thereof are provided to detect the encrypted traffic of a P2P network application service and control the detected traffic according to a policy, thereby considerably reducing the overhead. A P2P flow agent(400) participates in a real P2P network, and performs a role as a servant using the general P2P application service. A P2P security gateway(200) manages the detection and control of P2P traffic. A live policy update server(100) and a domain manager(300) control the operation of the P2P security gateway according to the change in a network environment and conditions of the P2P application service. The domain manager determines a local network service rule used by one P2P security gateway.