Abstract:
PURPOSE: A device and a method for detecting and blocking service attack of applied layer distribution are provided to enable a general user to continuously use a service by removing only attacker traffic by exactly extracting an internet address of an attacker. CONSTITUTION: An information collecting unit(104) monitors a service request packet which a plurality of server and a client request during a preset monitoring time. The information collecting unit collects data information transmitted by applied layer. A monitoring unit(106) set the monitoring time. The monitoring unit extracts traffic information in data information collected during a set monitoring time. An analyzing unit(108) determines whether an attack traffic exists or not by comparing the extracted traffic information with a previously learned traffic model.
Abstract:
PURPOSE: A device and a method determining the execution compression of PE files are provided to judge regardless of a compression method whether or not execution is compressed and to improve detection efficiency thereof. CONSTITUTION: A header analyzer(10) analyzes a header structure of a target file and confirms a PE (Portable Executable) file. If the object file is a PE file, a header information collector(20) generates the first record including characteristic value which is shown on a header of a packed PE file. A header information measurer(30) calculates similarity between the second records including characteristic value collected from the first record and a non-packed PE file. An execution compression determination unit(40) determines based on the similarity whether execution is compressed.
Abstract:
A polymorphic shell code detection method is provided to reduce operation overhead without missing corresponding instruction by performing a reverse assemble for detecting the instruction searching an address of the encoded code. An execution code address is stored in a register table(S100). In case the register item in which the executable code address is stored is used as the input of an instruction, the instruction defining rest register item is detected(S400). An emulation is performed from the instruction storing the executable code address in a stack or instructions defining rest register items from the first instruction. If the emulation result is stored in the memory, the input data is determined as a polymorphic shell code(S500).
Abstract:
본 발명은 파일 탐색 시스템 및 방법에 관한 것이다. 본 발명에 따르면, 파일 탐색 시스템은 파일 헤더의 시그너처를 이용해 네트워크로 송수신되는 패킷들 중에서 검색하고자 하는 파일이 포함된 네트워크 패킷을 수집한다. 이후, 수집된 네트워크 패킷에서 네트워크 프로토콜 헤더를 제거한 후 순서에 맞게 재구성하여 파일을 복원한다. 이렇게 복원된 파일은 정확성 검증을 거친 뒤, 검증된 파일에 한해서 다양한 파일 분석 시스템으로 전송 된다. 파일 검색, 파일 헤더, 실행 파일, 시그너처, 네트워크 패킷
Abstract:
A file search system and a method for collecting a desired file form from a network packet by using a signature of a file header of a file format desiring the analysis are provided to collect the network packet including a packet needing to analyze of the network packet transceived in network. A network packet is collected. A file network packet including a file of a desired file format of network packets collected based on the signature of a file header of the desired file format is extracted(110). The file is restored through the file network packet(120). The network packet including a packet needing to analyze the network packet transceived in network is collected.
Abstract:
본 발명은 가입자 네트워크 정보 보호 수준 평가를 위한 방법 및 그 장치를 개시한다. 본 발명에 의하면, 가입자 네트워크의 보안을 평가하는 방법에 있어서, 네트워크에 연결되어 있는 각 보안 장비들이 제공하는 보안 기능들을 각 보안 장비별로 수집하고, 수집된 보안 기능들을 보호 기능의 종류와 역할 및 중요도에 따라 각 보안 장비별로 분류하며, 분류된 보안 기능마다 점수 및 가중치를 부여하고, 각 보안 장비별로 보안 기능에 대한 점수를 계산하여 보안 등급을 결정하여, 해당 네트워크가 내부나 외부로부터의 사이버 공격에 대하여 어느 정도의 보호 기능들을 갖추고 있는지를 보다 객관적으로 평가할 수 있으며, 이를 이용하여 보안 기능에 대한 사전 평가가 가능하고 그 결과를 바탕으로 정보보호 기능들을 강화하거나 보완할 수 있는 방법을 제시한다.
Abstract:
역추적 관리 시스템 및 그 방법이 개시된다. 역추적 결과 확인부는 역추적 시스템의 역추적 진행 상황과 결과를 포함하는 역추적 정보를 요청하는 명령을 역추적 시스템 측에 구비된 소정의 역추적 관리 에이전트로 전송한다. 역추적 시스템 관리부는 역추적 시스템의 시작, 정지, 재시작을 포함하는 동작 제어 명령을 역추적 관리 에이전트로 전송한다. 로그 확인부는 역추적 시스템에서 수행하는 역추적과 관련된 각종 로그 기록을 요청하는 명령을 상기 역추적 관리 에이전트로 전송한다. 이로써, 원격지에서 다수의 역추적 시스템을 효율적으로 제어하고 관리할 수 있다
Abstract:
Disclosed is a network-based attack tracing system and method using a distributed attack detection agent and manager system that can detect and trace an attack path of a hacker in real time on the whole network using distributed network-based attack detection agent, request manager, and reply manager. The agent detects an attack using a network-based intrusion detection system (NIDS), analyzes an alarm log that is judged to be the attack, changes the analyzed alarm log into attack information, and transmits the attack information to the request manager. The request manager performs a search of an attack IP based on the attack information received from the agent, stores a result of search in a tree structure, and if a final search is completed, extracts a hacking path using a binary search tree (BST) algorithm. The reply manager searches an alarm log DB located in the agent of its own network in response to the attack information search request from the request manager, and transmits a result of search to the request manager. The system and method can use the detection function of the existing NIDS at maximum, control unnecessary tracing requests during the process of judging many alarm logs as the attack logs, and broaden its application range in case of the authenticated network.
Abstract:
PURPOSE: A response watermark generating/inserting apparatus for tracing back connection attack and a method therefor are provided to easily trace back a packet by inserting a watermark capable of discrimination into contents of a response packet of a damage system hacked by a hacker. CONSTITUTION: A packet check module(10) receives all packets through a network interface card(S1), and performs a test for searching a response packet corresponding to a damage system among the received packets. A watermark generating module(20) provides the response packet searched by the packet check module(10), and generates a packet watermark corresponding to the response packet. A watermark inserting module(30) inserts the packet watermark into a TCP(Transmission Control Protocol) data region in the response packet provided by the watermark generating module(20). A watermark packet transmitting module(40) transmits the packet provided from the watermark inserting module(30) through a network interface card(S2).
Abstract:
PURPOSE: A real time buffer overflow hacking detecting method is provided to detect and prevent a buffer overflow hacking attempt to a system by analyzing a system call generation position on a real time basis and detecting an unknown hacking form. CONSTITUTION: It is judged whether a system call paging has occurred(S401). If the system call paging has occurred, a system call generation address is extracted(S402). The extracted address is compared to a normal process memory region(S403). It is judged whether the system call paging has occurred in a stack region of a memory(S404). If the system call paging has occurred in the stack region of the memory, the system call paging is compared with a system call list(S405), to judge whether it is on the system call list(S406). If the system call paging has not occurred in the stack region of the memory, the system call is normally processed(S407). If the system call is on the system call list, a corresponding process is stopped and an alarm is provided to a system manager(S408).