Abstract:
본 발명은 악성 코드 분석 방법 및 장치에 관한 것으로, 특히 가상 환경에서 취약점이 내포된 대상 프로그램을 이용하여 비실행 파일에 포함된 악성 코드를 안전하게 분석하기 위한 방법 및 장치를 제공한다. 이를 위하여 본 발명의 일실시 예에 따른 악성 코드 분석 방법은, 가상 환경에서 실행되며 취약점이 내포된 대상 프로그램에 의해 악성 코드의 분석을 원하는 비실행 파일을 로드(load)하는 단계; 상기 대상 프로그램의 레지스터(register) 값을 분석하고, 상기 레지스터 값이 노멀 코드(normal code) 영역 내를 가리키는지 판단하는 단계; 상기 레지스터 값이 상기 노멀 코드 영역 이외의 영역을 가리키는 경우 상기 대상 프로그램의 동작에 관한 로그(log) 정보를 저장하는 단계; 및 상기 저장된 로그 정보를 기반으로 상기 비실행 파일에 포함된 악성 코드를 추출 및 분석하는 단계를 포함함으로써, 가상 환경에서 악성 코드를 분석하여 악성 코드의 실행으로 인하여 발생할 피해를 방지할 수 있는 이점이 있다. 가상 환경, 악성 코드, 비실행 파일, 로그
Abstract:
PURPOSE: An abnormal action interception device of an application program and a method thereof are provided to perform detection and interception of an abnormal action based on an action profile, thereby reducing a misjudgment rate of abnormal action detection. CONSTITUTION: An action monitor(311) detects actions of ongoing application programs(320). An abnormal action detector(312) decides whether the detected actions of the application programs are abnormal. If so, an abnormal action interceptor(313) intercepts execution of the actions of the application programs. An action profile extractor(317) generates an action profile by simulation of the application programs of analysis or source files of the application programs.
Abstract:
PURPOSE: A digital forensic apparatus and a method thereof are provided to analyze a page file according to a characteristic in a windows environment and use a suitable method for each characteristic. CONSTITUTION: A page file extracting unit(103) extracts a page file saved in a object storage medium. A storage page characteristic extracting unit(105) extracts a characteristic of a page saved in the extracted page file. A page classifying unit(109) compares a characteristic of the extracted page with one predetermined classification reference. The page classifying unit classifies the page according to the comparison result. A digital forensic executing unit(113) performs digital forensic correspondingly to the classified page.
Abstract:
A method and an apparatus for analyzing the malware software within a non-executable file which uses the virtual environment use the object program having the weak point in the virtual environment are provided to analyze the malware included in the non-executable file safely. A program execution part(114) outputs register value of an object program by loading non-executable file analyzed in an object program. A program run analysis part(122) analyzes the outputted register value. In case the register value indicates a domain except a normal code domain, the program run analysis part stores log information about the operation of the object program in the log information database(124). A malware analyze part(126) extracts and analyzes malware included in the non-executable file based on log information. When the outputted register value begins to indicate domain except the normal code area, the program run analysis part begins to store the log information.
Abstract:
A network management system and a method thereof are provided to manage a network based on the value of a network apparatus, thereby making network management considering characteristics of the network apparatus possible. A value-based network management system(10) comprises the followings: a value estimating part(101) collecting information about the value of network equipment; a storage(102) storing the value of the network equipment delivered from the value estimating part; a policy judging part(103) which compares the value of the network equipment, estimated at present, with the required value of the network equipment, delivered from a manager, to judge whether to apply the required value of the network equipment; and a policy executing part(104) which transmits a command for requesting the change into the required value to the network equipment, if the application is decided.
Abstract:
A method and a system for detecting an anomaly malicious code with a process behavior prediction technique are provided to detect the anomaly malicious code by making a prediction pattern based on combination between all behaviors generated from normal/malicious codes and related events, and comparing the prediction pattern with a behavior pattern generated from a new execution code. A database filtering module(200) filters malicious codes from execution codes executed in a system. A system resource monitoring module(3001) monitors system resources to collect individual event information generated from the executed execution codes. A reprocessing module(4001) reconfigures one integrated log representing a behavior property value of the execution codes by reprocessing the individual event information. A behavior prediction information processing module(500) extracts the behavior property value of an anomaly malicious behavior by inputting the integrated log in a learning algorithm. An anomaly malicious behavior detecting module(700) detects malicious behavior by comparing the anomaly malicious behavior property value extracted from the behavior prediction information processing module with behavior property value data reformed in the reprocessing module.
Abstract:
A system and a method for checking vulnerability of a web server by using a search engine are provided to efficiently check vulnerability with reduction of a vulnerability checking time and system overhead by checking the vulnerability of the probable web server after examining the web server probably including the vulnerability with the search engine in advance. A user terminal comprises a web server examining module(101) receiving a URL(Uniform Resource Locator) of the probable web server examined by the search engine after requesting the search engine to examine files probably including the vulnerability in response to an inputted keyword including a packet having the known vulnerability, and a web server vulnerability checking module(102). The web server vulnerability checking module sends a vulnerability checking query to the probable web server by parsing the URL received from the web server examining module, and checks the vulnerability in the web server with a response to the query or a returned message. The search engine constructs the system for obtaining the URL of the web server and transmitting the obtained URL to the web server examining module.
Abstract:
대상에정보를삽입하고, 대상부터정보를추출하기위한방법및 장치가제공된다. 정보삽입장치는정보를적어도하나의점의집합으로변환할수 있고, 변환에의해생성된적어도하나의점의집합을대상에출력할수 있다. 정보추출장치는대상에출력된적어도하나의점의집합을식별할수 있고, 식별된적어도하나의점의집합으로부터정보를추출할수 있다.