Abstract:
The present invention relates to an apparatus and method for the multi-analysis of a file for tracking an attack source and a spread site in real time. The present invention is technology to analyze a corresponding file by selectively applying a real-time analysis method or a cooperation analysis method for tracking the attack source and the spread site with regard to a harmful file among files loaded on a file sharing site. [Reference numerals] (100) File uploader; (200) File sharing server; (300) Attack tracking unit; (400) File posting unit; (500) Reputation analysis unit
Abstract:
PURPOSE: An agent device for sharing security information based an anonymous identifier among security management domains and a method thereof are provided to share security information based on an identifier based on hash, thereby preventing leakage of personal information included in the security information. CONSTITUTION: An identifier conversion unit(220) converts a real name identifier included in security information into an anonymous identifier and converts security information based on the real name identifier into security information based on the anonymous identifier. A security information communication unit(240) transmits the security information based on the anonymous identifier to the outside of a security management domain in order that security management domains share the security information. The identifier conversion unit converts the real name identifier included in the security information into a hash identifier which is the anonymous identifier by using a one-way hash function. [Reference numerals] (210) Security information providing unit; (220) Identifier conversion unit; (230) Identifier mapping information storage unit; (242) Security information transmitting unit; (244) Security analyzing information receiving unit; (250) Security analyzing information processing unit; (312) Security information receiving unit; (314) Security analyzing information transmitting unit; (320) Identifier reference storage unit; (330) Security information analyzing unit; (340) Reception agent device determination unit; (AA) Anonymous based security information; (BB) Anonymous based security information analyzing result
Abstract:
PURPOSE: An apparatus and a method for quantitative security policy evaluation are provided to quantitatively evaluate a security polity on a heterogeneous network through a quantitative evaluation model. CONSTITUTION: A security policy analyzing unit(102) analyzes a security policy of a network. An estimation reference defining unit(104) defines an evaluation standard. An estimation result calculating unit(106) calculates an evaluation result of each security component. A weight calculating unit(108) groups the security components according to a security function. A quantitative estimating unit(110) estimates a security polity of each group.
Abstract:
A security device and a method of a compound terminal using a security profile corresponding to an environmental parameter are provided to define a security functional profile according to the kind of the terminals and reconstruct the security function of the terminal. A security profile is set up in a manual or an automatic mode according as a security function configuration part(111) is the security level of a terminal user. A security profile storage part(113) stores the set up security profile. A terminal status monitoring part(114) reports the environmental parameter to the security function configuration part. The environmental parameter includes the change of the terminal power source, the abnormal intrusion attempt and a virus detection.
Abstract:
A multi-pattern search method using a pattern board which doesn't support a multi-pattern and an apparatus for the same are provided to implement multi-pattern searching through a pattern board supporting only single-pattern searching by configuring a bitmap table for search rules and creating a pattern index table containing the input pattern information of each pattern board. A multi-pattern search apparatus comprises a search rule setup part(410), an information storage part(420), and a multi-pattern judgement part(430). The search rule setup part creates a bitmap table, which contains rule indexes, pattern information, and bitmap information, and a pattern index table, which contains the input pattern and pattern index information of each pattern board corresponding to each of the patterns of the bitmap table. The information storage part stores the bitmap table and the pattern index table. Using the pattern boards, the multi-pattern judgement part extracts one or more patterns from an input stream, confirms a search rule associated with the extracted patterns through the pattern index table, and judges the existence of a multi-pattern in the input stream through the bitmap table.
Abstract:
An apparatus for implementing a 2x10 gigabit Ethernet application is provided to enable a user to implement various applications which support two 10 gigabit interfaces by using the IXP2850 network processor. An apparatus for implementing a 2x10 gigabit Ethernet application includes the first and the second micro block(310,320) for receiving packets, the third micro block(330) for helping transmission, and the fourth to seventh micro block(340-370) for transmitting packets. The first and the second micro block reassemble packets inputted via an Ethernet interface, write the reassembled packets to a DRAM, and transmit information on the packets to the third micro block. The third micro block receive the information on the packets from the first and the second micro block via the Ethernet interface, discriminates the packets according to port numbers, and transmits the information on the packets to the fourth to the seventh micro block. The fourth to the seventh micro block receive the information on the packets which are discriminated according to the port numbers, and transmit real packets, recorded at the DRAM, to a corresponding port based on the information on the packets.
Abstract:
A fast aria block encryption and decryption apparatus is provided to reduce the number of clock cycles used in encryption remarkably by increasing the number of rounds which can be calculated in a first clock and to downsize a hardware without an additional key initializing circuit by performing a key initializing process with a round operation unit. The fast aria block encryption and decryption apparatus performs encryption and decryption operation and key initialization process through following parts: the first round operation part to significantly reduce the number of clock cycle required in case of encryption, perform exclusive OR operation for input data of an object for encryption and decryption or an operation result of even number round and a key of odd number round, perform substitution operation to the result of exclusive OR operation, and perform diffusion operation for the result of exclusive OR operation(15); the second round operation part to perform exclusive OR operation for the result of the first round operation part and even number round key, substitution operation for the result of exclusive OR operation, and diffusion operation for the result of substitution operation(17); the first XOR period to perform exclusive OR operation for the result of substitution operation process of the second round operation part on the final round and the key for the final round, and print data for aria block encryption and decryption(18); and a part to perform encryption and decryption operation and key initialization process through round key generation part which generates and provides round key value needed to the operation of the first and second round operation part from the initial key value acquired from master key(25).
Abstract:
아리아 암/복호화 장치, 그 방법 및 이를 위한 초기 키 생성 방법이 개시된다. 본 발명은 복수의 라운드를 반복 수행하여 입력 데이터를 암/복호화하는 아리아 암/복호화 장치에 있어서. 제1제어신호에 따라 입력 데이터 또는 중간 계산값을 저장하는 제1레지스터; 매 라운드마다 입력되는 라운트 키를 저장하는 제2레지스터; 제1 및 제2레지스터에 저장된 값들을 배타적 논리합 연산하는 배타적 논리합 연산기; 배타적 논리합 연산된 결과를 아리아 치환 알고리즘에 따라 치환하는 치환부; 마지막 라운드가 아니면, 치환부의 치환결과를 아리아 확산 알고리즘에 따라 확산하는 확산부; 및 마지막 라운드가 아니면 확산부의 출력을, 마지막 라운드이면 치환부의 출력을 중간 계산값으로 출력하도록 제1제어신호를 출력하고, 마지막 라운드이면 치환부의 출력을 중간 계산값으로 출력하도록 제1제어신호를 출력하고 배타적 논리합 연산기의 출력을 아리아 암/복호화된 결과로 출력하는 제어부를 포함한다.
Abstract:
본 발명은 차세대 인터넷 프로토콜 네트워크 환경하에서, 패킷을 차단하는 장치 및 방법에 관한 것으로서, 네트워크 주소 관리부, 호스트 주소 관리부, 네트워크 프리픽스의 변경 통보 또는 IP 주소의 변경 통보를 수신하는 수신부, 수신부에서 상기 네트워크 프리픽스 변경 통보 또는 상기 IP 주소 변경 통보를 수신할 경우, 각각 네트워크 주소 관리부 및 호스트 주소 관리부를 갱신하는 주소 갱신부, 외부망으로부터 내부망으로 패킷 전송시, 네트워크 프리픽스의 유효기간이 경과하지 않은 경우 네트워크 주소 관리부를 기초로 패킷을 전송하고, 네트워크 프리픽스의 유효기간이 경과한 경우 패킷 수신을 차단하며, 내부망에서 호스트로 패킷 전송시, IP 주소의 유효기간이 경과하지 않은 경우 호스트 주소 관리부를 기초로 패킷을 전송하고, IP 주소의 유효기간이 경과한 경우 패킷 수신을 차단하는 패킷 처리부를 포함함으로써 차세대 인터넷 프로토콜 네트워크 환경하에서도 네트워크 관리자가 의도하는 호스트 및 내부망에서 패킷을 차단할 수 있다. 패킷 필터링, 패킷 차단
Abstract:
본 발명은 비정상 패킷 탐지 방법 및 장치에 관한 것으로, 비정상 패킷 탐지 장치는, 송신 서버로부터 수신 서버로 전송하고자 하는 패킷을 송신 서버로부터 전송받아 비정상 패킷임을 탐지하는 장치에 있어서, 패킷이 송신 서버와 수신 서버에서 세션이 성립된 이후 첫 번째 패킷인지 여부를 판단하는 세션 관리부, 세션 관리부에서 패킷이 첫 번째 패킷이라고 판단되는 경우에, 패킷이 보안 정책을 만족하는지 탐지하는 비정상 패킷 탐지부, 및 비정상 패킷 탐지부에서 패킷이 보안 정책을 만족하지 못한다고 판단되는 경우에, 상기 패킷이 비정상 패킷임을 알리는 알림부;로 구성되어, 기가급의 네트워크 환경에서 비정상 패킷을 실시간으로 탐지할 수 있다.