会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • Apparatus and method for providing real-time traceback connection using connection redirection technique
    • 使用连接重定向技术提供实时追溯连接的装置和方法
    • US20050060582A1
    • 2005-03-17
    • US10749744
    • 2003-12-30
    • Yang ChoiHwan KimDong SeoSangho Lee
    • Yang ChoiHwan KimDong SeoSangho Lee
    • H04L12/28G06F11/30H04L29/06
    • H04L63/1441H04L2463/146
    • An apparatus and method for providing traceback connection using a connection redirection technique are provided. A packet blocking unit blocks an attack packet transmitted to the system and a first response packet output from the system in response to the attack packet, if a system attack sensing signal is received. A response packet generation unit generates a second response packet into which a watermark is inserted, in response to the attack packet, and transmits the second response packet to a system corresponding to the source address of the attack packet. A path traceback unit receives a detection packet containing transmission path information of the second response packet from a system existing on a transmission path of the second response packet, and based on the received detection packet, traces back the transmission path of the second response packet and identifies the location of the attacker system. According to the apparatus and method, even when an attacker attacks a predetermined system via a plurality of systems, the actual location of the attacker system can be traced back fast and accurately and damage of the victim system can be minimized.
    • 提供了一种使用连接重定向技术提供回溯连接的装置和方法。 如果接收到系统攻击感知信号,则分组阻塞单元阻止发送到系统的攻击分组和响应于攻击分组从系统输出的第一响应分组。 响应分组生成单元响应于攻击分组生成插入了水印的第二响应分组,并将第二响应分组发送到与攻击分组的源地址对应的系统。 路径追溯单元从存在于第二响应分组的传输路径上的系统接收包含第二响应分组的传输路径信息的检测分组,并且基于接收到的检测分组,追踪第二响应分组的传输路径, 识别攻击者系统的位置。 根据该装置和方法,即使攻击者通过多个系统攻击预定的系统,也可以快速,准确地跟踪攻击者系统的实际位置,并且可以使受害者系统的损坏最小化。
    • 4. 发明申请
    • Method and apparatus for evaluating security of subscriber network
    • 评估用户网络安全性的方法和装置
    • US20060129810A1
    • 2006-06-15
    • US11302476
    • 2005-12-12
    • Youn JeongYang ChoiWon ParkSeung Oh
    • Youn JeongYang ChoiWon ParkSeung Oh
    • H04L9/00
    • H04L63/1433
    • A method and apparatus for evaluating the security of a subscriber network are provided. In the method and apparatus for evaluating the security of a subscriber network, pieces of information regarding a plurality of security functions provided by each of a plurality of network security devices connected to a network are collected, and the security functions are classified according to their types, purposes of use, and priority levels. Scores are given to the security functions using weights with reference to the classification results, and a security level for the network is determined by summing the scores of the security functions. Therefore, it is possible to objectively evaluate how secure a network is against cyber attacks launched internally or externally upon the network. In addition, it is possible to evaluate security functions provided by network security devices in a network in advance and enhance the performance of the security functions based on the evaluation results.
    • 提供了一种用于评估用户网络的安全性的方法和装置。 在用于评估用户网络的安全性的方法和装置中,收集关于与网络连接的多个网络安全装置中的每一个提供的多个安全功能的信息,并且根据其类型对安全功能进行分类 ,使用目的和优先级别。 使用参考分类结果的权重给予安全功能的分数,并且通过将安全功能的分数相加来确定网络的安全级别。 因此,可以客观地评估网络对内部或外部在网络上发起的网络攻击的安全性。 另外,可以提前评估网络安全设备提供的安全功能,并根据评估结果提高安全功能的性能。
    • 5. 发明申请
    • Device for Internet-worm treatment and system patch using movable storage unit, and method thereof
    • 用于互联网蠕虫治疗的装置和使用可移动存储单元的系统补丁及其方法
    • US20060021042A1
    • 2006-01-26
    • US10971978
    • 2004-10-22
    • Yang ChoiDong Seo
    • Yang ChoiDong Seo
    • G06F12/14
    • G06F21/568
    • A device for an Internet-worm treatment and a system patch using a movable storage unit is provided. The device includes: the movable storage unit for storing an integral program and integrity verification information; a program initializing unit for confirming an integrity of the Internet-worm treatment and system patch program by using the integrity verification information; a system control unit for cutting off a performance of the Internet worm malfunctioning the computer system, in case where the integrity is verified by the program initializing unit; a server unit for storing recent patch information and Internet-worm information; a treatment-information acquiring unit for acquiring the recent patch information and Internet-worm information, which is not applied to the infected computer system, from the server unit; and a system restoring unit for receiving the recent patch information and Internet-worm information from the treatment-information acquiring unit and applying the received information to the program, to perform the Internet-worm treatment and the system patch for the computer system.
    • 提供了一种用于互联网蠕虫治疗的装置和使用可移动存储单元的系统补丁。 该装置包括:可移动存储单元,用于存储整体程序和完整性验证信息; 用于通过使用完整性验证信息来确认因特网蠕虫治疗和系统补丁程序的完整性的程序初始化单元; 系统控制单元,用于在通过程序初始化单元验证完整性的情况下,切断因计算机系统故障而导致的因特网蠕虫的性能; 用于存储最近的补丁信息和因特网蠕虫信息的服务器单元; 治疗信息获取单元,用于从服务器单元获取未应用于受感染的计算机系统的最近的补丁信息和因特网蠕虫信息; 以及系统恢复单元,用于从治疗信息获取单元接收最近的补丁信息和因特网蠕虫信息,并将接收的信息应用于程序,执行因特网蠕虫治疗和计算机系统的系统补丁。
    • 6. 发明申请
    • Network simulation apparatus and method for analyzing abnormal network
    • 网络仿真设备及异常网络分析方法
    • US20060109793A1
    • 2006-05-25
    • US11123278
    • 2005-05-06
    • Hwan KimYang ChoiDong Seo
    • Hwan KimYang ChoiDong Seo
    • H04J1/16
    • H04L41/145H04L41/142H04L63/1425H04L63/1433
    • A network simulation apparatus and method for analyzing abnormal network traffic are provided. The network simulation apparatus includes: a traffic information collection unit, which collects traffic information in real time from a network; a simulator, which performs a simulation operation in a virtual network topology environment according to a predetermined scenario, the virtual network topology environment generating virtual traffic including a normal virtual packet modeled based on a normal traffic environment and an abnormal virtual packet modeled based on an abnormal traffic environment with a network traffic attack launched thereupon based on the collected real-time traffic information; and an interface unit, which provides the simulation operation results to a user. Accordingly, it is possible to effectively detect, analyze, and deal with abnormal network traffic that has occurred in a network to be managed.
    • 提供了一种用于分析异常网络流量的网络仿真设备和方法。 网络仿真装置包括:从网络实时收集交通信息的交通信息收集单元; 模拟器,其根据预定方案在虚拟网络拓扑环境中执行模拟操作,所述虚拟网络拓扑环境生成包括基于正常业务环境建模的正常虚拟分组的虚拟业务和基于异常的异常虚拟分组 基于收集的实时交通信息,发起网络流量攻击的交通环境; 以及向用户提供模拟操作结果的接口单元。 因此,可以有效地检测,分析和处理在要管理的网络中发生的异常网络流量。