发明授权
US07797741B2 System and method for coping with encrypted harmful traffic in hybrid IPv4/IPv6 networks
失效
在混合IPv4 / IPv6网络中应对加密有害流量的系统和方法
- 专利标题: System and method for coping with encrypted harmful traffic in hybrid IPv4/IPv6 networks
- 专利标题(中): 在混合IPv4 / IPv6网络中应对加密有害流量的系统和方法
-
申请号: US11238300申请日: 2005-09-29
-
公开(公告)号: US07797741B2公开(公告)日: 2010-09-14
- 发明人: Myung Eun Kim , Hwan Kuk Kim , Dong Il Seo
- 申请人: Myung Eun Kim , Hwan Kuk Kim , Dong Il Seo
- 申请人地址: KR Daejeon
- 专利权人: Electronics and Telecommunications Research Institute
- 当前专利权人: Electronics and Telecommunications Research Institute
- 当前专利权人地址: KR Daejeon
- 代理机构: Ladas & Parry LLP
- 优先权: KR10-2004-0107223 20041216
- 主分类号: G06F21/20
- IPC分类号: G06F21/20 ; H04L29/00 ; H04L29/08
摘要:
Provided are a system and method for coping with encrypted harmful traffic in hybrid IPv4/IPv6 networks. The system includes: an encryption key manager collecting encryption key information from a user terminal connected to the hybrid IPv4/IPv6 networks, and storing and managing the information in an encryption key database; an encryption traffic collector collecting encrypted traffic from traffic in the hybrid IPv4/IPv6 networks; an encryption key searcher searching for an encryption key used to decrypt the encrypted traffic from the encryption key database using a source IP address and a destination IP address of the encrypted traffic; a harmful traffic determiner decrypting the encrypted traffic using the encryption key and determining whether the decrypted traffic is harmful traffic; and an encryption traffic processor, if the decrypted traffic is determined to be harmful traffic, blocking the harmful traffic and, if the decrypted traffic is determined to be normal traffic, encrypting the normal traffic, and transferring the encrypted traffic to a user terminal corresponding to the destination IP address, thereby detecting and blocking an attack pattern using the encrypted harmful traffic in hybrid IPv4/IPv6 networks which cannot be detected by a conventional firewall system and more effectively protecting the networks.
公开/授权文献
信息查询