发明申请
US20100212013A1 LOG-BASED TRACEBACK SYSTEM AND METHOD USING CENTROID DECOMPOSITION TECHNIQUE
有权
基于LOG的跟踪系统和使用中心分解技术的方法
- 专利标题: LOG-BASED TRACEBACK SYSTEM AND METHOD USING CENTROID DECOMPOSITION TECHNIQUE
- 专利标题(中): 基于LOG的跟踪系统和使用中心分解技术的方法
-
申请号: US12669633申请日: 2007-11-21
-
公开(公告)号: US20100212013A1公开(公告)日: 2010-08-19
- 发明人: Jong Hyun Kim , Geon Lyang Kim , Seon Gyoung Sohn , Beom Hwan Chang , Chi Yoon Jeong , Jong Ho Ryu , Jung Chan Na , Jong Soo Jang , Sung Won Sohn
- 申请人: Jong Hyun Kim , Geon Lyang Kim , Seon Gyoung Sohn , Beom Hwan Chang , Chi Yoon Jeong , Jong Ho Ryu , Jung Chan Na , Jong Soo Jang , Sung Won Sohn
- 申请人地址: KR Daejeon
- 专利权人: Electronics and Telecommunications Research Instit
- 当前专利权人: Electronics and Telecommunications Research Instit
- 当前专利权人地址: KR Daejeon
- 优先权: KR10-2007-0073059 20070720
- 国际申请: PCT/KR2007/005859 WO 20071121
- 主分类号: G06F11/34
- IPC分类号: G06F11/34
摘要:
There are provided a system and method for tracing back an attacker by using centroid decomposition technique, the system including: a log data input module collecting log data of an intrusion alarm from an intrusion detection system; a centroid node detection module generating a shortest path tree by applying a shortest path algorithm to network router connection information collected by a network administration server, detecting a centroid node by applying centroid decomposition technique removing a leaf-node to the shortest path tree, and generating a centroid tree whose node of each level is the detected centroid node; and a traceback processing module requesting log data of a router matched with the node of each level of the centroid tree, and tracing back a router identical to the log data of the collected intrusion alarm as a router connected to a source of an attacker by comparing the log data of the router with the log data of the collected intrusion alarm. According to the system and method, an attacker causing a security intrusion event may be quickly detected, a load on the system is reduced, and a passage host exposed to a danger or having weaknesses may be easily recognized, thereby easily coping with an attack.
公开/授权文献
信息查询