Abstract:
A malware malicious software device for detecting and a method thereof including the execution file analyzer classifying layer and a malware malicious software classification machine detecting one or more malware malicious software are provided to measure the degree of byte distribution similarity of the execution file layer. An execution file analyzer(10) classifies a class according to the filed section of the execution file by analyzing the execution file. The execution file analyzer measures the byte distribution toward the field area of each layer. The malware malicious software classification unit(20) detects one or more malware malicious software based on the byte distribution of the field area.
Abstract:
본 발명은 악성프로그램 탐지 장치 및 그 방법에 관한 것으로, 실행 가능한 파일의 헤더를 분석하여 해당 파일의 악성프로그램 여부를 판단함으로써, 악성프로그램의 빠른 탐지가 가능하고, 알려지지 않은 악성프로그램에 대해서도 악성프로그램 여부를 예측 및 판단할 수 있어, 악성프로그램으로부터 시스템을 보호하고 보안성을 향상시키는 효과가 있다. 악성프로그램, 악성코드, malware, malicious software, virus, 바이러스, 탐지, PE파일
Abstract:
A security event sampling device and a method thereof based on the contents of the security event received from a network device are provided to maintain the contents characteristic information of sampled security events before sampling the security event. A security event accumulation module(110) collects a security event generated from a network apparatus. The contents of the collected security event are classified into for each type and stored in each memory of the security event storing part(100). A sampling ratio determining module(120) compares the number of maximum process security events and the number of previously determined average receiving security events. A security event analyzing module(130) analyzes the number of security events and calculates port correlation distribution.
Abstract:
An executable code detection method and a device thereof are provided to enable a CPU(Central Processing Unit) to decide whether an executable code exists and to verify data related to signature generation or an extracted signature, thereby enabling reliable signature to be extracted. Network data is inputted(S100). The inputted network data is reversely assembled to make instructions(S200). It is compared whether the made instructions are identical with instruction patterns complying with calling mechanism of a function(S300). It is decided whether an executable code exists in the network data according to the compared results(S400). Before reversely assembling the inputted network data, the network data is processed to enable the reverse assembling process.
Abstract:
A gigabit Ethernet line interface apparatus is provided to form many physical link ports through connecting with a network processor in a gigabit Ethernet linecard having a physical link interface and a system interface. A gigabit Ethernet line interface apparatus includes at least two physical link ports(112,116) selectively transmitting after converting inputted at least one gigabit Ethernet optical signal data to an electric signal. The physical link ports outputs after converting inputted at least one electric signal data to a gigabit Ethernet optical signal. At least two system interfaces is connected to a gigabit network processor card with a plurality connection interface to selectively output the electric signal data inputted through the physical link port to the gigabit network processor card. The system interfaces outputs data inputted from the gigabit network processor card through the connection interfaces to the physical link port. A mode setting unit(130) sets a communication channel ratio between the physical link port and the gigabit network processor card.
Abstract:
An attack pattern processing system and a method for the same are provided to watch various types of malicious traffic by efficiently arranging and storing no-case sensitive attack patterns and case sensitive attack patterns at a limited memory resource, and managing no-case sensitive attack patterns and the case sensitive attack patterns of the same strings on the same memory. An attack pattern processing system includes a memory(53), pattern converters(51,55) converting an attack pattern to be stored at the memory in accordance with a predetermined pattern conversion rule, and a hash function processor(52) obtaining a hash value of the converted attack pattern and storing the converted attack pattern information at an area of the memory corresponding to the obtained hash value. The attack pattern information consists of an attack pattern except a final letter of the attack pattern and information bits. The information bits include at least one of a bit representing whether the stored attack pattern is a no-case sensitive pattern, a bit representing whether the stored attack pattern is a case sensitive pattern, and a bit representing whether the final letter is capital or small.
Abstract:
An encryption apparatus of high capacity and speed utilizing a memory unit having an encryption function, and an implementation method thereof are provided to prevent a bottleneck state of a bus by performing the encryption within the memory unit directly. A general memory(110) stores data required to be encrypted according to a requirement of a user application program. An encryption processing memory(120) is inserted into a slot having the same I/O standards to the general memory, performs encryption operations and encryption key control operations independently by an embedded encryption function unit(125) by copying the data as general speed between memory units, and copies the data into the general memory. The encryption function unit is realized in the encryption processing memory unit as a separated chip, and performs encryption operations for the data based on an encryption key assigned according to the encryption key management policy.
Abstract:
An apparatus for analyzing and coping with an intrusion situation and a method for expressing attack detection alarms as an N-dimensional correlation graph are provided to enable a manager to intuitively recognize and cope with an intrusion situation by expressing an attack situation, its stages, and correlated attacks as a two or three-dimensional graph. An apparatus for analyzing and coping with an intrusion situation comprises the first analysis part(107) and the second analysis part(109). The first analysis part collects attack detection alarms from network alarm devices, classifies them, and expresses results as a three-dimensional graph. The second analysis part receives the results, executes vector conversion to project the three-dimensional graph onto a two-dimensional graph, and analyzes the correlations of attacks. The first analysis part comprises an attack detection alarm collection part, a classification part, and an N-dimensional express analysis part. The attack detection alarm collection part collects attack detection alarms. The classification part classifies the collected attack detection alarms according to attack stages and attack situations. The N-dimensional express analysis part outputs each classified attack stage as a three-dimensional graph.
Abstract:
모바일 IPv6 이동노드의 초기구동을 지원하기 위해 다이어미터 AAA 인프라를 이용하는 네트워크 시스템이 제공된다. 이 시스템은, 모바일 IPv6 프로토콜을 탑재한 이동노드, 이동노드가 새로운 네트워크에 이동 시 접근하는 수행원, 로컬네트워크에서의 이동노드의 인증/인가/권한검증 처리를 지원하는 AAA로컬서버, 홈 네트워크에서의 이동노드의 인증/인가/권한검증 처리를 지원하며 이동노드의 초기구동 시 초기 설정을 지원하는 AAA홈서버, 및 이동노드와의 바인딩업데이트 및 바인딩확인을 처리하는 홈에이전트를 포함한다. 그러므로, AAA로컬서버에 의해 인증된 이동노드에 대해, AAA홈서버는 그 이동노드의 초기구동을 위한 초기설정을 행할 수 있고, 이러한 초기설정에 기초하여 이동노드와 홈에이전트는 서로 간에 IPSec SA를 분배하고 바인딩업데이트 및 바인딩확인을 수행할 수 있다. 따라서, 본 발명은 모바일 IPv6 초기구동에 있어, 이동노드와 홈에이전트 사이에 안전한 초기구동을 보장할 수 있다. Mobile IPv6, AAA(Authentication Authorization and Accounting), DIAMETER, Mobile Internet, Wireless Internet, Mobile Computing
Abstract:
본 발명은 모바일 RFID 환경에서의 성인 인증 시스템 및 그 방법에 관한 것으로, 보다 상세하게는 개인정보보호 기능이 강화된 성인 인증 시스템 및 그 방법에 관한 것이다. 본 명세서에서 개시하는 모바일 RFID 환경에서의 성인 인증 시스템은 RFID 태그, 사용자 단말, 성인 인증 요청 처리기, 그리고 CP(Contents Provider)로 구성되며, 성인 컨텐츠의 RFID 태그에 기록된 성인인증 등급 정보를 독출하는 등급 정보 독출부; 상기 독출된 등급 정보의 최종 등급을 결정하는 성인인증 등급 결정부; 및 상기 결정된 최종 등급과 상기 단말 사용자의 연령을 근거로 상기 최종 등급에 해당하는 성인 컨텐츠를 상기 단말의 사용자에게 제공해도 되는지의 여부를 판단하는 서비스 등급 인증 유효성 검사부를 포함하여 본 발명의 기술적 사상을 구체화하고 본 발명의 목적 및 기술적 과제를 달성한다.