Abstract:
PURPOSE: A portable terminal and an external Interface control method for improving the security of the portable terminal are provided to interrupt external Interface which it does not use acts with the external aggression. CONSTITUTION: If a system call requesting the opening of an external Interface is received, an external interface control module(20) confirms the opening or closing about the requested external Interface from the external Interface policy. A device driver(10) blocks the requested external Interface according to a control command of the external Interface control module. According to the external Interface control module is each user process, external Interface policies are established.
Abstract:
A system for preventing private information from leaking out through access context analysis in a personal mobile terminal includes a private information manager that receives a private information leakage prevention policy, divides the policy into a plurality of private information leakage prevention rules, and transmits the plurality of rules to individual modules, respectively; a context analyzer that performs access context information analysis to obtain context information, when detecting a packet corresponding to a first rule, and transmits the context information; a packet analyzer that receives the context information, monitors packets transmitted to the outside through packet analysis, and transmits filtering information when detecting a packet corresponding to a second rule; and a private information leakage preventing unit that receives the filtering information and determines whether to allow or drop a packet corresponding to a third rule.
Abstract:
본 발명은, 인터넷 프로토콜 버전 4/인터넷프로토콜 버전 6 혼합망에서의 침입탐지규칙 통합 관리를 위한 것으로서, IPv4/IPv6 침입탐지시스템과 독립적으로 칩입탐지규칙 통합 관리 장치를 구현하며, 상기 칩입탐지규칙 통합 관리 장치에서 외부로부터 수신된 침입탐지규칙에 포함된 인터넷 프로토콜 버전 4 주소 및 인터넷 프로토콜 버전 6 주소 간의 연관성을 분석하고, 분석된 결과를 이용하여 상기 수신된 침입탐지규칙을 자동 변환한 후 상기 변환된 침입탐지규칙을 해당 데이터베이스에 저장하고, 상기 변환된 침입탐지규칙 및 연관성 정보를 해당 침입탐지시스템으로 전달함으로써, 효과적으로 침입탐지규칙을 통합 관리할 수 있다. IPv4/IPv6 혼합망, 침입탐지시스템(IDS), 침입탐지규칙, 연관성 분석, 자동 변환.
Abstract:
A mobile terminal for blocking service attack through heterogenous networks and a method thereof are provided to disable the simultaneous use of a wireless Ethernet access device and a mobile communication modem, thereby making a cracker not to generate a plurality of SMS(Short Message Service)/MMS(Multimedia Message Service)/voice calls. A state information storage unit(36) records state information. The state information is about whether a process opens a driver of a wireless Ethernet access device. A state monitoring unit(34) blocks or permits the process to open the driver of the mobile communication modem according to the state information. If a record that the driver is opened, the state monitoring unit blocks the open of the driver of a corresponding process.
Abstract:
An apparatus and a method for detecting IPv6 attack packets are provided to detect and cope with the attack of IPv6 packets by judging the attack possibility of IPv6 packets and tunneling packets and intercepting or deleting packets having some possibility of making an attack. An apparatus for detecting IPv6 attack packets comprises a control part(400), a preprocessing part(100), an attack judgment part(200) and a packet processing part(300) and a traffic information storage part(500). The control part establishes attack judgment rules and attack packet processing rules, and controls the operations of the attack judgment part and the packet processing part by using the traffic information of attack packet stored at the traffic information storage part. The preprocessing part decodes IPv6 packets and tunneling packets and classifies the decoded packets according to payload and header structures. Using the classified packet information, the attack judgment part judges the attack possibility of each packet according to the established attack judgment rules, and detects an attack by using the vulnerability of IPv6 protocol. Based on a judgment result from the attack judgment part and the attack packet processing rules, the packet processing part intercepts, deletes or forwards packets or creates intrusion detection information.
Abstract:
A method and an apparatus for generating and searching TCAM entry are provided to execute full-matching search and range search, using a single TCAM entry by configuring the single TCAM entry to be combined with a full-matching value by replacing a range with a specific bit. According to a method for generating a TCAM(Ternary Content Addressable Memory) entry(100) consisting of upper m bits for range search and lower n bits for full-matching search, it is judged whether an entry to be added is a range search entry(102) or a full-matching search entry(104). If the added entry is for range search, a new range item is added; the bit index corresponding to the added range item is set as the value of the upper m bits, which is defined by a range table(110), and the lower n bits are set as 'don't care bit'(x); and a new TCAM entry consisting of (m+n) bits is added to a TCAM table. If the entry is for full-matching search, the upper m bits are set as '0' and the lower n bits are set as the value of the added entry.
Abstract:
본 발명은 필드 레벨을 이용한 패킷 분류 방법 및 장치에 관한 것으로, (a) 포함 관계가 성립하는 주소 정보에 패킷 분류 규칙을 통하여 포함 관계를 추출하고 단계별로 세부 번호를 부여하여 필드 레벨을 생성하는 필드 레벨 생성단계; (b) 상기 (a)단계에서 생성된 필드 레벨 각각에 대한 패킷 분류 규칙의 마스크와 패킷 분류 규칙의 필드 레벨을 저장하고, 상기 필드 레벨 생성부에서 생성된 필드 레벨이 상기 주소 정보와 매칭되도록 TCAM에 저장하는 필드 레벨 저장 제어단계; 및 (c) 외부로부터 패킷이 도착하였을 경우 상기 패킷이 주소 정보를 상기 TCAM으로 송신하고 상기 TCAM 룩업으로 획득한 필드 레벨을 수신하고 상기 필드 레벨 저장제어부에 저장된 각각의 주소 정보에 대한 패킷 분류 규칙의 마스크와 패킷 분류 규칙의 필드 레벨을 로딩하여 연산 과정을 수행함으로써 포함관계가 성립되는지 여부를 판단하는 비교 판단단계;로 구성된다. 따라서, 포함관계가 발생하는 주소로 이루어진 규칙들을 놓치지 않고 모두 찾을 수 있다.