Abstract:
기존악성샘플들과의유사성을기반으로유사도가가장높은악성샘플들을검색하여유사한데이터들을출력하고해당악성샘플들의제작자그룹정보를분석가에게제공함으로써분석가가상세분석에활용할수 있도록하는악성코드특징정보기반의유사악성코드검색장치및 방법을제시한다. 제시된장치는입력받은신규악성코드를신규악성코드샘플로서등록하되신규악성코드샘플의상세정보를추출하여등록하는악성코드등록부, 신규악성코드샘플의상세정보를분석하는악성코드분석부, 악성코드분석부에서의악성코드분석정보를근거로악성코드특징정보를포함한악성코드 DNA 정보를추출하는악성코드 DNA 추출부, 추출된악성코드 DNA 정보와기저장된악성코드샘플의악성코드 DNA 정보를 DNA 타입별로유사도비교를행하는악성코드 DNA 비교부, 및악성코드 DNA 비교부에서계산된유사도를기반으로신규악성코드샘플과기저장된악성코드샘플간의전체유사도를계산하여특정개수의악성코드샘플을유사악성코드검색결과로서추출하는유사악성코드검색부를포함한다.
Abstract:
본 발명의 실시예에 따른 패킷 처리 장치는 복수의 HTTP 패킷으로 구성된 패킷 그룹을 복수의 세션 파일로 분류하여, 분배하는 세션 처리부, 복수의 세션 파일에 기초하여 분배된 각각의 세션 파일에서 개별적으로 메타 데이터를 생성 및 콘텐츠를 추출하는 병렬 처리부 및 병렬 처리부에서 생성된 메타 데이터 또는 추출된 콘텐츠를 저장하는 저장부를 포함한다.
Abstract:
The present invention provides a device and a method for detecting network intrusion which perform perl compatible regular expressions (PCRE)-based pattern matching for a payload of packet using a network processor having a deterministic finite automata (DFA) engine. For the purpose, a device for detecting network intrusion according to the present invention includes: a network processor core for receiving packets from a network and transmitting a payload of the received packets to the DFA engine; a detection rule converter for converting a predetermined PCRE-based detection rule into a detection rule which has a pattern to which an only PCRE rule corresponding to the DFA engine is applied for detecting attack packets; and the DFA engine for performing PCRE pattern matching for a payload of packets based on the detection rule converted by the detection rule converter. [Reference numerals] (100) Detection rule converter; (220) Network processor core; (240) DFA engine; (AA) Detection rule; (BB) Packet; (CC) Intrusion detection result
Abstract:
A device and a method for detecting an HTTP botnet based on the density of web transaction is disclosed. The device for detecting an HTTP botnet based on the density of web transaction according to the present invention includes a collection management part for extracting metadata from an HTTP request packet collected by a traffic collection sensor; a web transaction classification part for creating a gray list by extracting web transaction by analyzing the metadata and arranging the extracted web transaction according to the access frequency; and a filtering part for filtering the gray list based on a white list and a black list. [Reference numerals] (100) Collection management part; (200) Web transaction classification part; (300) Filtering part; (400) Black list management part; (500) White list generating machine
Abstract:
A traffic control device based on CAPTCHA and a method thereof are provided. A traffic control device according to the present invention includes: a traffic monitoring unit for monitoring packets which are transmitted and received between an internal network and an external network; a CAPTCHA verification unit for transmitting a CAPTCHA request message corresponding to packet information to a client computer in the internal network, receiving a CAPTCHA response message corresponding to the CAPTCHA request message and verifying the CAPTCHA response message when the packet information corresponding to the packet does not exist in an access control list; a list management unit for detecting a control policy corresponding to the packet information from the access control list when the packet information exists in the access control list; and a traffic control unit for controlling traffic between the internal network and the external network based on a verified result of the CAPTCHA response message or the control policy. [Reference numerals] (110) Traffic control unit; (120) Traffic monitoring unit; (130) List management unit; (140) CAPTCHA verification unit; (20) External network; (250) Application; (AA) Client computer; (BB) CAPTCHA agent; (S301,S302) Packet transmission; (S303,S305) Packet information transmission; (S306) CAPTCHA request message; (S307) CAPTCHA response message; (S308,S309) Verified result transmission; (S310) Traffic allowance or cut-off; (S311) Update
Abstract:
PURPOSE: A filtering apparatus based on IP and method thereof, and legality user identification apparatus and method thereof are provided to offer the convenience of a user by protecting IP from DDOS(Distributed Denial Of Service) attack. CONSTITUTION: A determination control unit(220) determines a packet which is transmitted from a user IP(Internet Protocol). In case the receive packet is not matched with a legality IP, the determination control unit determines the capacity of a web server. When the determination control unit determines the packet which is transmitted a legality user IP, a packet transmission unit(230) transmits the packet to the web server by controlling the determination control unit.
Abstract:
PURPOSE: A distribution site identification method of an active-X control, security vulnerability detection method, and immunization method are provided to recognize the distribution of an active-X control. CONSTITUTION: A checking object URL is obtained by performing a search engine query in a distribution site identification server(S202,S203). The checking object URL is accessed through the implementation of a web browser(S204,S205). It is determined whether to use active-X control in the accessed detection target(S206). The information of the corresponding active-x control is collected and recorded in the distribution present condition DB(S208).
Abstract:
PURPOSE: An abnormal action interception device of an application program and a method thereof are provided to perform detection and interception of an abnormal action based on an action profile, thereby reducing a misjudgment rate of abnormal action detection. CONSTITUTION: An action monitor(311) detects actions of ongoing application programs(320). An abnormal action detector(312) decides whether the detected actions of the application programs are abnormal. If so, an abnormal action interceptor(313) intercepts execution of the actions of the application programs. An action profile extractor(317) generates an action profile by simulation of the application programs of analysis or source files of the application programs.