Abstract:
Provided are an apparatus and a method for improving a detection performance of an intrusion detection system which promote the optimization of detection rules by enhancing right detection rate of intrusion detection rules in the intrusion detection system. The provided apparatus comprises a deformation detection data generating part for changing original detection data detected based on current detection rules into deformation detection data according to deformation detection data rules; a deformation detection data classifying part for classifying the deformation detection data according to each attack type, classifying the deformation detection data for each attack type according to each current detection rule, and classifying the deformation detection data for each detection rule according to each of right detection/wrong detection; a deformation keyword tree generation part for generating a right detection deformation keyword tree and a wrong detection deformation keyword tree based on a result from the deformation detection data classifying part; a right detection path identifying part for comparing the right detection keyword tree with the wrong detection keyword tree to generate a right detection node, and identifying a right detection path connecting a reference node to the right detection node in the right detection deformation keyword tree; and a right detection pattern generating part for generating a right detection pattern based on the identified right detection path.
Abstract:
Disclosed are an apparatus for controlling communication blocking and a method thereof. The apparatus for controlling communication blocking according to the present invention comprises: a communication controller for receiving a communication blocking request or a communication blocking release request from a terminal; and a state controller for registering the terminal in a communication blocking state or releasing the communication blocking state according to the request received from the communication controller. The communication controller, if receiving the communication blocking request, generates a CAPTCHA corresponding to a response from a terminal's user based on the communication blocking release request; receives a response corresponding to the CAPTCHA from the terminal; and controls the terminal to perform communication with the outside via a network based on a result compared from the CAPTCHA response with a CAPTCHA list. [Reference numerals] (10) Communication blocking controlling apparatus; (100) State controller; (200) Communication controller; (AA) Internet
Abstract:
본 발명은 특정 이벤트가 발생하거나 특정 프로그램 수행 조건이 만족하는 경우에만 악성 행위를 실행하도록 작성된 윈도우용 악성 코드를 탐지하기 위한 프로그램 자동 분석 장치에 관한 것이다. 본 발명에 따른 프로그램 자동 분석 장치는 분석 대상 프로그램의 명령어를 분석하고 상기 명령어의 적어도 한번 이상의 강제 수행을 통해 프로그램 수행 정보를 생성하는 자동 분석 엔진과, 상기 자동 분석 엔진에 의해 생성된 프로그램 수행 정보를 저장하는 수행 정보 DB와, 상기 수행 정보 DB에 저장된 수행 정보에 기반하여 상기 분석 대상 프로그램의 수행 흐름을 분석하는 수행 흐름 분석부와, 상기 수행 흐름 분석부에 의해 분석된 수행 흐름 정보에 기초하여 사용자에게 수행 결과를 제공하는 수행 결과 제공부를 포함한다. 백도어, 트로이 목마, 봇, IRC 봇, 윈도우, 악성코드, 행위 분석, 디버거
Abstract:
A DDoS attack coping method using a deterministic pushback method is provided to check the IP address of an attack source edge router when a DDoS attach occurs, and filter DDoS attack packets in the attack source edge router, thereby filtering the attack packets flowing into a network in an attack source. A DDoS(Distributed Denial of Service) attack coping method using a deterministic pushback method comprises the following steps of: marking its own IP(Internet Protocol) address to all packets outbound to the other network system from the edge router of a specific network system for checking the IP address of a source edge router for a DDoS attack packet in a damaged system(S100); recombining IP addresses by using the detected DDoS attack packets and acquiring the IP address information of an attack source edge router in the damaged system detecting a DDoS attack(S200); allowing the attack source edge router to receive the deterministic pushback message, check message information, and filter the attack packets the if the damaged system transmits a deterministic pushback message to the attack source edge router(S300).
Abstract:
A system and a method for detecting web application attacks by using a web log correlation analysis are provided to detect unknown attacks according as determining whether an access to a specific web page is normal or not, and to reduce false positive rate. A system for detecting web application attacks includes a web log preprocessor(110), a web log database(120), a web log correlation unit(130), and a correlation analysis information database(133). The web log preprocessor converts log information stored at a web log into formatted web log, constructs the formatted web log in a formatted log and stores the formatted web log at the web log database. The formatted web log stored at the web log database is transferred to a web log correlation unit. The web log correlation unit, including a connection state analysis unit(131) and a similarity measurement unit(132), calls the formatted web log, analyzes the formatted web log, and detects an intrusion with respect to a client request by using the analysis result. The connection state analysis unit manages site topology information, namely detects an abnormal access to a site by maintaining information on a state of connection between web pages. The connection state analysis unit determines an abnormal access or not by using a status code of the formatted web log in the formatted log table. Then, the connection state analysis unit stores a query string of a user to the correlation analysis information database in case of determining that an access to the web site is abnormal. The similarity measurement unit checks whether there exists string similar to query string of an attacker at the correlation analysis information database by calculating similarity of the query string of the attacker on the basis of the Ratcliff pattern matching algorithm.
Abstract:
A method for checking/providing vulnerability of ActiveX control, and a device and the method for identifying the same are provided to check/prove the vulnerability of the ActiveX control, which is installed by a predetermined website or installed with a predetermined program, from identification to reverse engineering. A main module stores all registry information under an HKEY_CLASSES_ROOT CLSID registry, and identifies COM having a difference by comparing stored registry information with the registry information before/after installation of the predetermined program. A test module checks over whether the COM having the difference provides an IDispathc or IDispathcEx interface. The test module continuously performs a task by executing again the other test module if the test module is abnormally terminated while performing an interface checking task.
Abstract:
본 발명은 인터넷 프로토콜을 사용하는 네트워크에서 발신측 및 착신측의 통신 방법에 관한 것이다. TCP/IPv4 프로토콜을 이용한 인터넷의 발달로 사용자들은 음성 및 비음성 등의 다양한 멀티미디어 정보 획득과 유통에 상당한 편익을 누리고 있는 반면에 정보의 역기능 현상이 많이 나타나고 있다. 이러한 문제점을 해결하기 위해 종래의 TCP/IPv4 프로토콜을 이용하는 응용 서비스별로 각각의 보호 모듈을 따로 사용하고 있다. 이렇게 기존의 방법을 사용하면 개별 응용 서비스별로 안전하게 정보를 교환할 수 있지만, TCP/IPv4 프로토콜을 이용하는 응용 서비스는 매우 다양하며, 다양한 응용 서비스별로 보호 모듈을 따로 사용하는 것은 비효율적이며 낭비적인 요소가 상당히 많다. 본 발명에서는 상기 문제점을 해결하기 위하여 TCP/IPv4 프로토콜을 이용하는 인터넷 혹은 네트워크 사용자들이 사용하는 응용 서비스를 공통된 한가지 방법으로 모두 만족시켜 정보를 안전하게 교환할 수 있도록 안전한 IP 헤더를 새로이 고안하여 사용자 인증, 전송 데이터의 기밀성 유지 그리고 전송 데이터의 무결성 점검 기능을 제공할 수 있다.