APPARATUS AND METHOD FOR DETECTING ABNORMAL CONNECTION BEHAVIOR BASED ON ANALYSIS OF NETWORK DATA
    22.
    发明申请
    APPARATUS AND METHOD FOR DETECTING ABNORMAL CONNECTION BEHAVIOR BASED ON ANALYSIS OF NETWORK DATA 审中-公开
    基于网络数据分析检测异常连接行为的装置和方法

    公开(公告)号:US20170034195A1

    公开(公告)日:2017-02-02

    申请号:US15004412

    申请日:2016-01-22

    CPC classification number: H04L63/1425

    Abstract: An apparatus and method for detecting abnormal connection behavior are disclosed. The apparatus for detecting abnormal connection behavior includes a data extraction unit, a data storage unit, and a detection unit. The data extraction unit collects network data transmitted and received over a network including a plurality of hosts, and extracts data required for the detection of abnormal connection behavior from the network data. The data storage unit stores the extracted data required for the detection of abnormal connection behavior. The detection unit detects abnormal connection behavior based on characteristic factors corresponding to the stored data required for the detection of abnormal connection behavior and characteristic factors corresponding to malicious behavior.

    Abstract translation: 公开了一种用于检测异常连接行为的装置和方法。 用于检测异常连接行为的装置包括数据提取单元,数据存储单元和检测单元。 数据提取单元收集通过包括多个主机的网络发送和接收的网络数据,并从网络数据中提取检测异常连接行为所需的数据。 数据存储单元存储用于检测异常连接行为所需的提取数据。 检测单元根据对应于检测异常连接行为所需的存储数据和与恶意行为对应的特征因素的特征因素检测异常连接行为。

    APPARATUS AND METHOD FOR DETECTING A MALICIOUS CODE BASED ON COLLECTING EVENT INFORMATION
    23.
    发明申请
    APPARATUS AND METHOD FOR DETECTING A MALICIOUS CODE BASED ON COLLECTING EVENT INFORMATION 审中-公开
    基于收集事件信息检测恶意代码的装置和方法

    公开(公告)号:US20150220733A1

    公开(公告)日:2015-08-06

    申请号:US14603241

    申请日:2015-01-22

    CPC classification number: G06F21/552

    Abstract: The apparatus for detecting a malicious code comprises a feature factor collecting module collecting information of feature factor events from a computing device based on the defined feature factors, a feature factor specification module converting the collected information of feature factor events to feature factor specification data in the form available on the analysis, and a malicious code detection module analyzing if a malicious code is or not by using the specification data.

    Abstract translation: 用于检测恶意代码的装置包括:特征因子收集模块,基于所定义的特征因子收集来自计算设备的特征因子事件的信息,特征因子指定模块将所收集的特征因子事件的信息转换为特征因子指定数据 表单可用于分析,恶意代码检测模块通过使用规范数据来分析是否有恶意代码。

    APPARATUS AND METHOD FOR DETECTING VIOLATION OF CONTROL FLOW INTEGRITY

    公开(公告)号:US20220269777A1

    公开(公告)日:2022-08-25

    申请号:US17518373

    申请日:2021-11-03

    Abstract: Disclosed herein are an apparatus and method for detecting violation of control flow integrity. The apparatus includes memory for storing a program and a processor for executing the program, wherein the processor multiple branch identifier registers to which identifiers of branch targets are written, a set branch identifier instruction configured to command an identifier of a branch target to be written to a branch identifier register at a predetermined sequence number, among the multiple branch identifier registers, and a check branch identifier instruction configured to command a signal indicating detection of a control flow hijacking attack to be issued based on whether a value written to the branch identifier register at the predetermined sequence number is identical to a value of an identifier of a branch target at the predetermined sequence number, wherein the program detects whether a control flow is hijacked based on the multiple branch identifier registers.

    STEPPING-STONE DETECTION APPARATUS AND METHOD

    公开(公告)号:US20180234436A1

    公开(公告)日:2018-08-16

    申请号:US15807425

    申请日:2017-11-08

    Abstract: Disclosed herein are a stepping-stone detection apparatus and method. The stepping-stone detection apparatus includes a target connection information reception unit for receiving information about a target connection from an intrusion detection system (IDS), a fingerprint generation unit for generating a target connection fingerprint based on the information about the target connection, and generating one or more candidate connection fingerprints using information about one or more candidate connections corresponding to one or more flow information collectors, and a stepping-stone detection unit for detecting a stepping stone by comparing the target connection fingerprint, in which a maximum allowable delay time is reflected, with the candidate connection fingerprints.

    METHOD AND APPARATUS FOR DETECTING CYBERTHREATS THROUGH CORRELATION ANALYSIS

    公开(公告)号:US20180191761A1

    公开(公告)日:2018-07-05

    申请号:US15823209

    申请日:2017-11-27

    Abstract: Disclosed is a method for detecting a cyberthreat through correlation analysis of security events, which includes extracting a false-positive data set by extracting, from source data, information about security events occurring during a predetermined time period based on a time at which erroneous detection occurred; extracting a true-positive data set by extracting, from the source data, information about security events occurring during the predetermined time period based on a time at which an intrusion threat was correctly detected; extracting a current data set by extracting information about security events occurring during the predetermined time period from data to be analyzed; generating event coincidence statistics by extracting a frequency of each security event in the respective data sets and by compiling statistics thereon; generating an event vector based on the event coincidence statistics; and performing intrusion threat detection through a vector space model based on the event vector.

    APPARATUS AND METHOD FOR DETECTING DISTRIBUTED REFLECTION DENIAL OF SERVICE ATTACK

    公开(公告)号:US20180131717A1

    公开(公告)日:2018-05-10

    申请号:US15803062

    申请日:2017-11-03

    Abstract: Disclosed herein are an apparatus and method for detecting a Distributed Reflection Denial of Service (DRDoS) attack. The DRDoS attack detection apparatus includes a network flow data reception unit for receiving network flow data from network equipment, a session type determination unit for determining a session type of the received network flow data, a host type determination unit for determining a type of host corresponding to the network flow data based on the session type, an attack method determination unit for determining an attack method corresponding to the network flow data, a protocol identification unit for identifying a protocol of the network flow data, and an attack detection unit for detecting a DRDoS attack based on the session type, the host type, the attack method, and the protocol.

Patent Agency Ranking