会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • N grouping of traffic and pattern-free internet worm response system and method using N grouping of traffic
    • N组流量和无模式的互联网蠕虫响应系统和使用N组流量的方法
    • US07779467B2
    • 2010-08-17
    • US11542320
    • 2006-10-02
    • Daesik ChoiWoonyon KimDongsu KimCheolwon LeeEungki Park
    • Daesik ChoiWoonyon KimDongsu KimCheolwon LeeEungki Park
    • G06F11/34G08B23/00G06F12/14
    • H04L63/145
    • Provided are N grouping of traffic and pattern-free Internet worm response system and method. According to the method, traffic factors generated by respective worms are grouped into N groups so that a great quantity of Information may be effectively understood and a worm generated afterward is involved with characteristics of a relevant group. Damages of a network or a system predictable through already classified N traffic characteristics are defined so that corresponding step-by-step measures are taken. Characteristics of the grouped worms are quantitatively analyzed so that a danger degree of a new worm is predicted when the new worm appears afterward and forecasting and alarming through the prediction are performed. Easiness with which a controlling operator instantly understands an accident using a visualization method having an approximate real-time characteristic is increased, so that detection efficiency for most worms not detected using a conventional rule is increased.
    • 提供了N组流量和无模式的互联网蠕虫响应系统和方法。 根据该方法,由各蠕虫产生的交通因素分组为N组,从而可以有效地理解大量信息,并且随后产生的蠕虫涉及相关组的特征。 定义了通过已经分类的N个流量特征可预测的网络或系统的损害,以便采取相应的逐步措施。 分类蠕虫的特征进行定量分析,以便在新蠕虫出现之后预测出新的蠕虫的危险程度,并通过预测进行预报和报警。 控制操作员使用具有近似实时特性的可视化方法即时了解事故的容易度增加,从而增加了使用常规规则未检测到的大多数蠕虫的检测效率。
    • 4. 发明授权
    • System and method for managing network by value-based estimation
    • 通过基于价值的估计来管理网络的系统和方法
    • US08171521B2
    • 2012-05-01
    • US12039858
    • 2008-02-29
    • Young Han ChoiHyoung Chun KimTae Ghyoon KimDo Hoon LeeEungki Park
    • Young Han ChoiHyoung Chun KimTae Ghyoon KimDo Hoon LeeEungki Park
    • G06F17/00
    • H04L41/0893
    • A system and method for managing a network by value-based estimation is provided. A network device requesting communication is defined as an active point and a network device receiving a request for communication is defined as a passive point. A value of a network device is determined according to the number of active points connected to the corresponding network device, and a value of a network device that is in a path of communication between network devices is determined based on a value of a network device passing through the corresponding network device. When a policy for changing a network environment is transferred in a state where the values of the network devices have been estimated, a policy conflict test is performed on the basis of the estimated values of the network devices, thereby determining application of the policy in due consideration of the values and significance of the network devices.
    • 提供了一种通过基于价值的估计来管理网络的系统和方法。 请求通信的网络设备被定义为活动点,并且接收通信请求的网络设备被定义为被动点。 根据连接到相应网络设备的活动点的数量来确定网络设备的值,并且基于网络设备通过的值来确定处于网络设备之间的通信路径中的网络设备的值 通过相应的网络设备。 当在网络设备的值已被估计的状态下转移网络环境的策略时,基于网络设备的估计值执行策略冲突测试,从而确定策略的应用 考虑网络设备的价值和意义。
    • 5. 发明申请
    • System and method for detecting hidden process using system event information
    • 使用系统事件信息检测隐藏过程的系统和方法
    • US20070300061A1
    • 2007-12-27
    • US11527018
    • 2006-09-26
    • Eun Young KimYoungtae YunEungki Park
    • Eun Young KimYoungtae YunEungki Park
    • H04L9/00
    • G06F21/566G06F21/56
    • A system and method for detecting a hidden process using system event information are provided. The system includes: a kernel layer monitoring module for extracting system event information by monitoring a kernel layer system; a kernel layer process list detecting module for detecting processes related to an event from the extracted system event information; an application layer process list detecting module for detecting a process list provided to a user from an application layer; and a hidden process detecting module for detecting a process that is present only in the kernel layer as a hidden process by comparing the processes detected from the kernel layer process list detecting module and the processes detected from the application layer process list detecting module.
    • 提供了一种使用系统事件信息检测隐藏过程的系统和方法。 该系统包括:内核层监控模块,用于通过监控内核层系统提取系统事件信息; 内核层处理列表检测模块,用于从所提取的系统事件信息中检测与事件有关的进程; 应用层处理列表检测模块,用于从应用层检测提供给用户的进程列表; 以及隐藏处理检测模块,用于通过比较从内核层处理列表检测模块检测的处理和从应用层处理列表检测模块检测到的处理,来检测仅存在于内核层中的进程作为隐藏处理。
    • 6. 发明申请
    • SYSTEM AND METHOD FOR MANAGING NETWORK BY VALUE-BASED ESTIMATION
    • 通过基于价值的估计来管理网络的系统和方法
    • US20080313701A1
    • 2008-12-18
    • US12039858
    • 2008-02-29
    • Young Han CHOIHyoung Chun KIMTae Ghyoon KIMDo Hoon LEEEungki PARK
    • Young Han CHOIHyoung Chun KIMTae Ghyoon KIMDo Hoon LEEEungki PARK
    • G06F15/173G06F21/00
    • H04L41/0893
    • A system and method for managing a network by value-based estimation is provided. A network device requesting communication is defined as an active point and a network device receiving a request for communication is defined as a passive point. A value of a network device is determined according to the number of active points connected to the corresponding network device, and a value of a network device that is in a path of communication between network devices is determined based on a value of a network device passing through the corresponding network device. When a policy for changing a network environment is transferred in a state where the values of the network devices have been estimated, a policy conflict test is performed on the basis of the estimated values of the network devices, thereby determining application of the policy in due consideration of the values and significance of the network devices.
    • 提供了一种通过基于价值的估计来管理网络的系统和方法。 请求通信的网络设备被定义为活动点,并且接收通信请求的网络设备被定义为被动点。 根据连接到相应网络设备的活动点的数量来确定网络设备的值,并且基于网络设备通过的值来确定处于网络设备之间的通信路径中的网络设备的值 通过相应的网络设备。 当在网络设备的值已被估计的状态下转移网络环境的策略时,基于网络设备的估计值执行策略冲突测试,从而确定策略的应用 考虑网络设备的价值和意义。
    • 7. 发明申请
    • DDoS FLOODING ATTACK RESPONSE APPROACH USING DETERMINISTIC PUSH BACK METHOD
    • DDoS FLOODING攻击响应方法使用确定性的推回方法
    • US20080127324A1
    • 2008-05-29
    • US11860625
    • 2007-09-25
    • Jung-Taek SeoKiwook SohnEungki Park
    • Jung-Taek SeoKiwook SohnEungki Park
    • G06F21/00
    • H04L63/1458H04L2463/141H04L2463/146
    • Provided is a method for responding a distributed denial of service (DDoS) attack using deterministic pushback scheme. In the method, all of packets outbound from an edge router of a predetermined network system to the other network system are marked with own IP address in order to enable a victim system to confirm an IP address of an attack source edge router for DDoS attack packets. Then, IP address information of an attack source edge router is obtained by reassembling an IP address of detected DDoS attack packets at a victim system that detects DDoS attack. A deterministic pushback message is received at an attack source edge router if a victim system transmits a deterministic pushback message to the attack source edge router, information of the attack source edge router is confirmed, and corresponding attack packets are filtered.
    • 提供了一种使用确定性推回方案来应对分布式拒绝服务(DDoS)攻击的方法。 在该方法中,从预定网络系统的边缘路由器向另一个网络系统出站的所有分组都标有自己的IP地址,以便受害系统能够确认攻击源边缘路由器的IP地址用于DDoS攻击包 。 然后,通过在检测到DDoS攻击的受害者系统上重新组建检测到的DDoS攻击报文的IP地址,获得攻击源边缘路由器的IP地址信息。 如果受害者系统向攻击源边缘路由器发送确定性推回消息,则确认攻击源边缘路由器的信息,并对相应的攻击报文进行过滤,则在攻击源边缘路由器处接收到确定性推回消息。
    • 9. 发明申请
    • N grouping of traffic and pattern-free Internet worm response system and method using N grouping of traffic
    • N组流量和无模式的Internet蠕虫响应系统和使用N组流量的方法
    • US20070150958A1
    • 2007-06-28
    • US11542320
    • 2006-10-02
    • Daesik ChoiWoonyon KimDongsu KimCheolwon LeeEungki Park
    • Daesik ChoiWoonyon KimDongsu KimCheolwon LeeEungki Park
    • G06F11/00
    • H04L63/145
    • Provided are N grouping of traffic and pattern-free Internet worm response system and method. According to the method, traffic factors generated by respective worms are grouped into N groups so that a great quantity of information may be effectively understood and a worn generated afterward is involved with characteristics of a relevant group. Damages of a network or a system predictable through already classified N traffic characteristics are defined so that corresponding step-by-step measures are taken. Characteristics of the grouped worms are quantitatively analyzed so that a danger degree of a new worm is predicted when the new worm appears afterward and a forecast and alarming through the prediction are performed. Easiness with which a controlling operator instantly understands an accident using a visualization method having an approximate real-time characteristic is increased, so that detection efficiency for most of worms not detected using a conventional rule is increased.
    • 提供了N组流量和无模式的互联网蠕虫响应系统和方法。 根据该方法,将各蠕虫产生的交通因素分组为N组,从而可以有效地理解大量的信息,并且随后产生的磨损涉及相关组的特征。 定义了通过已经分类的N个流量特征可预测的网络或系统的损害,以便采取相应的逐步措施。 分组蠕虫的特征进行定量分析,以便在新蠕虫出现之后预测出新的蠕虫的危险程度,并通过预测进行预报和报警。 控制操作员使用具有近似实时特性的可视化方法即时了解事故的易感性增加,从而增加了使用常规规则未检测到的大多数蠕虫的检测效率。