Abstract:
A learning type DNS analyzer for monitoring DNS traffic and discovering abnormal domain and an analysis method thereof are provided. The present invention relates to a DNS analyzer and is to provide a DNS analyzer which generates and analyzes statistics about DNS traffic and discovers a domain name which is infected by malicious codes and is being inquired as an abnormal domain. An analysis component and a classification rule for discovering an abnormal domain is generated through learning about pre-given normal and abnormal domain data and continuously updated through a learning data log which is obtained by analyzing the DNS traffic. Therefore, the abnormal domain discovery of the DNS analyzer can be continuously improved. [Reference numerals] (100) DNS analyzer; (110) DNS data collection unit; (120) Database unit; (122) DNS data; (124) DNS traffic statistics; (126) Comparison statistics; (128) Abnormal domain statistics; (132) White list; (134) Black list; (136) Learning data log; (140) Statistics processing unit; (142) DNS traffic statistics module; (144) Abnormal domain statistics module; (146) Comparison statistics module; (150) Abnormal domain detection unit; (152) Filtering module; (154) Classification module; (156) Learning module; (160) User interface unit; (AA) DNS server; (BB) Network
Abstract:
The present invention relates to a method and an apparatus for quantifying threat conditions to recognize network threat in advance. The disclosed threat condition quantification method comprises a step of extracting a doubt domain by analyzing the packet pattern of a DNS traffic generated in a monitoring target network; a step of giving a corresponding security level to the predetermined security level according to the result for grasping the access IP in which the doubt domain is connected; a step of calculating an activation index according to a monitoring result of the doubt domain; a step of inferring the predicted attack amount in each doubt domain according to the predicted attack amount and the security level in each zombie computer. Therefore, the present invention recognizes the network threat condition in advance, prevents the attack based on the doubt domain and the predicted attack amount information, and generates an alarm for preventing the threat condition. [Reference numerals] (AA) START;(BB) END;(S201) Traffic packet pattern analysis;(S203) Doubt domain extraction;(S205) Access IP grasp;(S207) Security level provision;(S209) Access IP monitoring;(S211) Activation index calculation;(S213) Minimum prediction attack amount calculation;(S215) Maximum prediction attack amount calculation;(S217) Estimating prediction attack amount in each doubt domain
Abstract:
본발명에따른사이버위협사전예측장치는, DNS 트래픽을분석하여 C&C 서버로의심되는도메인주소를추출하는 DNS 기반 C&C 서버탐지부; 네트워크트래픽을분석하여상기 C&C 서버에접속하는좀비 PC들의 IP 주소를검출하고좀비 PC들의정보를탐지하는네트워크기반비정상탐지부; 및상기좀비 PC들의정보를기반으로사이버위협상황을예측하는사이버위협예측부를포함하는것을특징으로한다.
Abstract:
본 발명에 의한 투명성을 보장하는 전송 계층에서의 보안 제공 방법 및 그 장치는, 어플리케이션 프로그램으로부터 데이터 패킷을 수신한 후 상기 데이터 패킷에 해당하는 키 정보를 검색하는 단계; 상기 검색이 실패하면, 어플리케이션 계층에 상주하는 키 교환 모듈에 새로운 키를 협상할 것을 요청하고 대기하는 단계; 및 상기 키 교환 모듈이 새롭게 협상된 키 정보를 커널에 저장하면, 이를 기반으로 암호 및 복호를 수행하는 단계;를 포함하는 것을 특징으로 하며 커널 내의 전송 계층에서 데이터 패킷에 대한 암호/복호를 수행함으로써 어플리케이션 프로그램에 보안 투명성을 제공하고, 용이한 확장성과 효율적으로 제어할 수 있는 구조를 제공한다. 전송 계층 보안, 전송계층보안(Transport Layer Security), 커널(kernel), Secure Socket Layer(SSL), 투명성(Transparency)
Abstract:
PURPOSE: A method for tracking attack sources and attack distribution places and a system thereof are provided to manage a path and configuration for an attack scenario by tracking an abnormal file uploader in real-time. CONSTITUTION: An agent(500) receives an information confirmation message of an abnormal file corresponding to the information transmission of an abnormal file(S117). The agent selects a place corresponding to the information of the abnormal file as an attack distribution place(S119). The agent transmits an abnormal file uploader information request message. The agent receives the abnormal file uploader information corresponding to the request message(S121). When the received abnormal file uploader information corresponds to the stored uploader information, the agent sets an attack source using the abnormal file uploader information(S123). [Reference numerals] (100) Attack computer; (200) User computer; (300) Network security server; (400) Site file management server; (500) Agent; (S101) Upload an abnormal file; (S103) Analyze action and extract uploader information; (S105) Transmit the uploader information; (S107) Store the uploader information; (S109) Download abnormal file; (S111) Store downloaded user information with the uploader information; (S113) Transmit attack information when detecting cyber attack; (S115) Transmit transmission network address; (S117) Transmit confirmation message of the transmission network address; (S119) Define an attack distribution place; (S121) Receive the uploader information; (S123) Define an attack source
Abstract:
Disclosed are an apparatus for quantifying the abnormality of an abnormal host and a method thereof. The apparatus for quantifying abnormality according to the present invention comprises: an analysis component extractor for extracting analysis components in a DNS traffic; a node classifier for modeling the analysis components according to a classification rule and classifying terminal nodes within a network based on the modeling result; a basic probability extractor for checking a relative distribution corresponding to the terminal node classification result and extracting a basic probability value based on the check result; a counter for classifying malicious zombie nodes by using the basic probability value, extracting domain information among traffics from the malicious zombie nodes to a DNS server, and counting the number of domain occurrences based on the extracted domain information; and a quantifying part for extracting a quantified value of the malicious domains based on the number of domain occurrences and quantifying the abnormal value of the abnormal host based on the quantified value. [Reference numerals] (110) Analysis component extractor; (120) Node classifier; (130) Basic probability extractor; (140) Counter; (150) Quantifying part
Abstract:
PURPOSE: A network attack detecting and responding device and a method thereof are provided to accurately detect a network attack for a RAN(Radio Access Network) which is not able to be detected with a signal based detecting method. CONSTITUTION: A resource usage amount gathering unit(100) collects resource usage information provided through a network. A resource usage amount analysis unit(102) analyzes and classifies attributions and resources collected through the usage amount collecting unit. An attack detecting unit(104) detects a traffic attack by comparing a profile in each port and resource usage information analyzed through the resource usage analysis unit. An attack responding unit(106) generates a security policy for user information detected from the attack detecting unit. The attack response unit transmits the generated security policy to each security device. [Reference numerals] (1) Network; (100) Resource usage amount gathering unit; (102) Resource usage amount analysis unit; (104) Attack detecting unit; (106) Attack responding unit