Abstract:
본 발명은 파이프라인 방식의 힙 관리기 및 그의 우선순위 정렬 방법에 관한 것이다. 본 발명에서는 10Gbps급 패킷 스케줄러에서 자신을 포함한 왼쪽 하위 노드들의 점유(Non-empty) 카운터를 이용하여 고속 정렬 기능을 수행한다. 구체적으로, 매 패킷 세그먼트 타임(32㎱)마다 2개의 패킷 세그먼트에 대한 우선순위 값을 받아 정렬을 수행하고, 1개의 가장 높은 우선순위 값을 가지는 패킷 세그먼트를 서비스한다. 따라서, 10Gbps 패킷 스케줄러에서 새로 입력되는 플로우의 패킷과 대기 중인 패킷을 동시에 받아 우선순위를 정렬할 수 있다. 이외에도, 연속적인 두 개의 패킷 세그먼트들 간에 메모리 충돌 없이 정렬 기능을 수행하며, 많은 우선순위 레벨에 대해 쉽게 확장할 수 있다. 또한, 작업 보존 방식과 비 작업 보존 방식으로 구성 가능하여 지연 경계(Delay Bound)나 지터(Jitter) 등 실시간 서비스 품질(QoS)의 보장을 제공할 수 있다.
Abstract:
Disclosed is a network-based attack tracing system and method using a distributed attack detection agent and manager system that can detect and trace an attack path of a hacker in real time on the whole network using distributed network-based attack detection agent, request manager, and reply manager. The agent detects an attack using a network-based intrusion detection system (NIDS), analyzes an alarm log that is judged to be the attack, changes the analyzed alarm log into attack information, and transmits the attack information to the request manager. The request manager performs a search of an attack IP based on the attack information received from the agent, stores a result of search in a tree structure, and if a final search is completed, extracts a hacking path using a binary search tree (BST) algorithm. The reply manager searches an alarm log DB located in the agent of its own network in response to the attack information search request from the request manager, and transmits a result of search to the request manager. The system and method can use the detection function of the existing NIDS at maximum, control unnecessary tracing requests during the process of judging many alarm logs as the attack logs, and broaden its application range in case of the authenticated network.
Abstract:
PURPOSE: A response watermark generating/inserting apparatus for tracing back connection attack and a method therefor are provided to easily trace back a packet by inserting a watermark capable of discrimination into contents of a response packet of a damage system hacked by a hacker. CONSTITUTION: A packet check module(10) receives all packets through a network interface card(S1), and performs a test for searching a response packet corresponding to a damage system among the received packets. A watermark generating module(20) provides the response packet searched by the packet check module(10), and generates a packet watermark corresponding to the response packet. A watermark inserting module(30) inserts the packet watermark into a TCP(Transmission Control Protocol) data region in the response packet provided by the watermark generating module(20). A watermark packet transmitting module(40) transmits the packet provided from the watermark inserting module(30) through a network interface card(S2).
Abstract:
PURPOSE: A system and a method for judging attack using the log monitoring on an IDS(Intrusion Detection System) are provided to adjust the load of a reverse tracking system and to enhance the reliability for the attack detection by monitoring and processing a log generated from the IDS, and tracking the actual intrusion after judging it by a defined attack type. CONSTITUTION: A monitoring part(31) extracts an IP(Internet Protocol), time, and a log type from the log record detected by the IDS(11). A rule processor(32) previously defines the attack types for analyzing the attack logs, analyzes and compares the updated log from the monitored log with the defined attack type, and judges the actual attack if the updated log is agreed with the defined attack type. A statistics processor(33) improves the reliability for the attack log by applying a critical value for the updated log that is judged as the actual attack by the rule processor(32), and judges the log having the attack trial of a higher frequency than the critical value as the attack.
Abstract:
An intrusion detection method by adaptive rule estimation in a network-based intrusion detection system (NDS) is disclosed. The method includes collecting a packet on a network and searching for an original rule most similar to the collected packet from a rule database in which a rule for intrusion detection is stored, and judging whether a hacker intrudes by estimating a changed position of the collected packet from the original rule. Accordingly, it is possible to prevent an indirect attack of a hacker using a packet whose number of bits is changed due to deletion/insertion of characters from/into the packet.
Abstract:
PURPOSE: A switch interface device interworking a DASL(Data-Aligned Synchronous Link) interface with a CSIX(Common Switch Interface) is provided to interwork a UTOPIA-L3/DASL conversion module in a network processor, and to interwork a common UTOPIA-L3/DASL conversion module with a CSIX by using an FPGA module, thereby interworking a DASL switch interface with a switch fabric. CONSTITUTION: An IBM network processor(500) is connected with a UTOPIA-L3/DASL conversion module(501) through a DASL interface(505), and has 2 A/B sides in accordance with switch duplexing. A DASL interface data packet stream controlling signal(508) is connected through a UTOPIA-L3/CSIX conversion module FPGA(502). The UTOPIA-L3/DASL conversion module(501) and the UTOPIA-L3/CSIX conversion module FPGA(502) control a packet stream by a UTOPIA control signal(506). The UTOPIA-L3/CSIX conversion module FPGA(502) uses a switch clock as a CSIX interface clock. The UTOPIA-L3/DASL conversion module(501) and the UTOPIA-L3/CSIX conversion module FPGA(502) build control processor interfaces(504) therein in order to interface with an IBM CPU.
Abstract:
PURPOSE: An apparatus and a method for controlling a high-speed IP forwarding engine on the basis of a high-speed lookup device are provided to overcome deterioration in performance, due to lookup process, by embodying a hardware lookup device driver to configure a lookup table as preparation for the driving of a high-speed IP lookup device and replacing an existing software-based lookup module. CONSTITUTION: A forwarding control system based on a high-speed IP lookup device consists of a lookup device(36), a control data structure memory(32), a lookup device and memory initialization control part(33), a lookup table configuration part(34), and a lookup device and memory control part(35). The lookup device(36) compares a lookup table stored in an internal lookup memory(37) with the address information of an inputted IP packet and finds out forwarding information stored in an external forwarding memory(38). The control data structure memory(32) stores the configuration information of a structure that manages the control data of the lookup device(36), the control data of the lookup memory(37), and the control data of the forwarding memory(38) in common. The lookup device and memory initialization control part(33) issues a control command to initialize the lookup device(36), the lookup memory(37), and the control data structure memory(32) in case that an initialization command is generated from an upper application program module(31). In case that a lookup entry addition/deletion command is generated from the upper application program module(31), the lookup table configuration part(34) searches the lookup table to confirm whether an addition or deletion lookup entry exists, adds or deletes the addition or deletion lookup entry according to a search result, and issues a control command to update the contents of the control data structure memory(32). The lookup device and memory control part(35) receives the issued control commands and inputs control values, related to the issued control commands, to the lookup device(36), the lookup memory(37), and the forwarding memory(38).
Abstract:
PURPOSE: A parallel lookup control device for various service IP(Internet Protocol) packet forwarding and a method therefor are provided to prevent the performance degradation of the IP packet forwarding and improve a lookup performance as to various services. CONSTITUTION: A lookup control unit(103) has a lookup information storing unit(201) for storing information required in various service classified lookup such as an IP destination address, an IP source address, a TCP(Transmission Control Protocol) destination port number, a TCP source port number, connection information of a received packet, and VPN(Virtual Private Network) root identification information. The lookup control unit(103) has each service classified lookup comparison control unit(501-503) for obtaining information required in each service lookup from the lookup information storing unit(201) and generating a comparison control signal according to each service, and each service classified lookup identity index storing unit(504-506) for storing an identical entry index corresponding to each service classified lookup result in the each service classified lookup comparison control unit(501-503). The lookup control unit(103) has an index priority comparing unit(510) for comparing the entry indexes stored in the service classified lookup identity index storing units(504-506) according a service priority, and a label table index generating unit(511) for generating a label table index according to the selected priority. A lookup engine(104) has each service classified forwarding table(507-509) for storing each service classified lookup information.
Abstract:
1. 청구범위에 기재된 발명이 속한 기술분야 본 발명은 레이블 스위칭 경로 설정을 위한 제어 메시지 처리 방법에 관한 것임. 2. 발명이 해결하려고 하는 기술적 과제 본 발명은 초고속 공중 통신망의 근간이 되는 비동기전달모드 교환시스템내에서 인터넷 트래픽을 고속으로 전송하기 위하여 레이블 스위칭 경로를 설정하기 위한 제어 메시지를 처리하는 제어 메시지 처리 방법 및 상기 방법을 실현시키기 위한 프로그램을 기록한 컴퓨터로 읽을 수 있는 기록매체를 제공하는데 그 목적이 있음. 3. 발명의 해결방법의 요지 본 발명은, 타국으로부터 입력된 레이블 스위칭 경로 설정 제어 메시지를 분석하여 인터넷 프로토콜(IP) 프리픽스별로 스위치 자원을 요청하는 제 1 단계; 인터넷 프로토콜(IP) 프리픽스별로 스위치 자원을 할당하는 제 2 단계; 인터넷 프로토콜(IP) 프리픽스와 할당된 스위치 자원을 맵핑하는 제 3 단계; 및 상기 맵핑된 정보를 레이블 스위칭 경로 설정을 요청한 상기 타국으로 전송하는 제 4 단계를 포함한다. 4. 발명의 중요한 용도 본 발명은 비동기전달모드 교환시스템 등에 이용됨.