Abstract:
PURPOSE: A system and a method for detecting intrusion using a hybrid neural network are provided to detect the intrusion including an unknown intrusion pattern and to process the intrusion in real-time. CONSTITUTION: A packet collector(110) collects a packet existed on the network. A packet preprocessor(120) patterns the collected packet through a preprocessing process in order to use the packet collected through the packet collector as an input value of the neural network. An intrusion detection pattern learning part(210) learns the patterned packet by receiving the patterned packet from the packet preprocessor and using the clustering neuron network, and clusters the intrusion detection pattern by using a data distribution and a frequency. An intrusion detection judging part(220) receives a clustering result value and the connection level information of the patterned packet, learns the intrusion detection judgment through the result value and the connection level information by using the learning neuron network, and detects the intrusion.
Abstract:
본 발명은 웹 응용프로그램 취약점 분석 지원 방법에 관한 것으로서, 웹페이지 분석 및 연관성 분석이 이루어지는 단계와, 웹 응용프로그램의 전체적인 구조와 취약점에 관련된 정보를 분석하는 단계와, 취약점 점검자에게 웹 응용프로그램 취약점 분석 업무를 지원하기 위해 웹페이지의 상호관계와 함께 웹페이지별 취약점 관련 요소 식별에 대한 그래픽 사용자 인터페이스를 제공하는 단계로 진행함으로써, 웹점검자와의 상호작용을 통해 취약점을 점검해 주는 취약점점검 지원 방법을 통해 웹 시스템에서 발생할 수 있는 보안상 취약점을 미리 진단 및 분석, 보고하여 웹 시스템에서 발생할 수 있는 보안사고를 미연에 방지할 수 있다. 웹 응용프로그램, 보안 취약점
Abstract:
PURPOSE: An authentication method for protecting an agent and a message is provided, which defends the attack from a malicious agent and message level, and assures authentication at an initial access trial process. CONSTITUTION: According to the authentication method, a transmitter agent(1) request authentication to a facilitator(2) in order to transfer a message to an unknown agent. The facilitator performs mutual authentication with the transmitter agent and then exchanges a session key. The facilitator finds an agent coinciding with its object and performs mutual authentication, and then exchanges the session key. And the transmitter agent constitutes an independent security channel with a receiver agent(3) selected using the session key.
Abstract:
PURPOSE: A method of assigning a link capacity in a VPN(Virtual Private Network) is provided to request reassignment from a manager by a VPN subscriber when transmissions are congested or transmissions are reduced in a VPN, in order to dynamically control a capacity of a virtual link, thereby obtaining economical benefits. CONSTITUTION: A VPN manager is assigned with an initial link capacity(CI) from a basic communication network manager while setting up a virtual link(S1). The VPN manager operates a self-subscribed VPN with the initial link capacity(CI)(S2). If a request of changing a capacity of the virtual link is generated owing to increased or reduced transmissions, the VPN manager compares a demanded link capacity(SI) with the initial link capacity(CI)(S3). If the demanded link capacity(SI) is smaller than the initial link capacity(CI), the VPN manager requests the demanded link capacity(SI)(S4), and is assigned with the first changing link capacity(RI1) having the same size as the demanded link capacity(SI)(S5).
Abstract:
PURPOSE: A system and a method for detecting intrusion using a hybrid neural network are provided to detect the intrusion including an unknown intrusion pattern and to process the intrusion in real-time. CONSTITUTION: A packet collector(110) collects a packet existed on the network. A packet preprocessor(120) patterns the collected packet through a preprocessing process in order to use the packet collected through the packet collector as an input value of the neural network. An intrusion detection pattern learning part(210) learns the patterned packet by receiving the patterned packet from the packet preprocessor and using the clustering neuron network, and clusters the intrusion detection pattern by using a data distribution and a frequency. An intrusion detection judging part(220) receives a clustering result value and the connection level information of the patterned packet, learns the intrusion detection judgment through the result value and the connection level information by using the learning neuron network, and detects the intrusion.
Abstract:
PURPOSE: A device and method for chasing the root of an invader is provided to execute a reverse chase of the root of an invader sequentially without changing components of a network through all networks including the Internet. CONSTITUTION: A detection module(7) detects an invasion and analyzes an invasion-detected system. A reverse chase agent(2) obtains an IP address of a previous system based on traces created in the system caused by an invasion. A server(4) receives an IP address of the system analyzed from the detection module(7) and the reverse chase agent(2), and monitors/manages a chase state of the reverse chase agent(2). An agent installation module(5) installs the reverse chase agent(2) in the system of the IP address being supplied from the server(4). An analysis module(3) communicates the reverse chase agent(2) with the server(4) safely and analyzes the system based on the obtained IP address. A data managing module(6) stores a series of chase and analysis processes being supplied from the server(4) and supplies data necessary for a searching process to the server(4).
Abstract:
PURPOSE: A method of assigning a link capacity in a VPN(Virtual Private Network) is provided to request reassignment from a manager by a VPN subscriber when transmissions are congested or transmissions are reduced in a VPN, in order to dynamically control a capacity of a virtual link, thereby obtaining economical benefits. CONSTITUTION: A VPN manager is assigned with an initial link capacity(CI) from a basic communication network manager while setting up a virtual link(S1). The VPN manager operates a self-subscribed VPN with the initial link capacity(CI)(S2). If a request of changing a capacity of the virtual link is generated owing to increased or reduced transmissions, the VPN manager compares a demanded link capacity(SI) with the initial link capacity(CI)(S3). If the demanded link capacity(SI) is smaller than the initial link capacity(CI), the VPN manager requests the demanded link capacity(SI)(S4), and is assigned with the first changing link capacity(RI1) having the same size as the demanded link capacity(SI)(S5).
Abstract:
본 발명은 웹 응용프로그램에서 발생할 수 있는 취약점을 분석하는 웹 응용프로그램 취약점 분석 장치 및 방법에 관한 것으로, 상기 웹 응용프로그램에 의해 웹 서버의 보안상 침해의 소지가 있는 취약점을 내포할 것으로 예상되는 웹 페이지들의 정보를 제공해줌으로써, 보안상의 취약점을 미리 진단 및 분석하여 상기 웹 응용프로그램에서 발생할 수 있는 보안사고를 미연에 방지하는 것이다. 이에, 본 발명은 웹 응용프로그램들 간의 관계를 도식화해주는 웹 연관성 분석 맵과, 웹 페이지들을 방문하여 게시판, 다운로드 스크립트, 관리자 페이지, 사용자 입력이 가능한 페이지, 숨김 속성변수를 포함한 페이지, 불필요하거나 개발 중인 페이지, 개발자의 주석을 포함한 페이지, 회원 페이지 등의 정보를 수집하는 정보수집모듈과 상기 정보수집모듈에 의해 식별된 웹 페이지들을 대상으로 모의공격수행을 지원하는 모의공격수행 지원모듈로 구성된다. 웹 응용프로그램, 보안, 웹 서버, 정보수집모듈, 모의공격수행 지원모듈