-
1.
公开(公告)号:US20190044730A1
公开(公告)日:2019-02-07
申请号:US15994049
申请日:2018-05-31
Inventor: Samuel WOO , Dae-Sung MOON , Kyung-Min PARK , Jooyoung LEE , IK-KYUN KIM , Seung-Hun JIN , Ho HWANG
Abstract: Disclosed herein are an apparatus and method for generating and operating a dynamic Controller Area Network (CAN) Identifier (ID). The apparatus includes a priority ID generation unit for generating a priority ID that is a base ID, a dynamic ID generation unit for generating a dynamic ID that is dynamically changed, and a communication unit for transmitting/receiving a data frame in which a dynamic CAN ID including the priority ID and the dynamic ID is combined with data.
-
公开(公告)号:US20190052663A1
公开(公告)日:2019-02-14
申请号:US15985452
申请日:2018-05-21
Inventor: Jooyoung LEE , Dae-Sung MOON , Kyung-Min PARK , Samuel WOO , Ho HWANG , Ik-Kyun KIM , Seung-Hun JIN
IPC: H04L29/06
CPC classification number: H04L63/1433 , H04L63/1425 , H04L63/20
Abstract: Disclosed herein is an apparatus for enhancing network security, which includes an information collection unit for collecting information about states of hosts that form a network and information about connectivity in the network; an attack surface analysis unit for analyzing attack surfaces by creating an attack graph using the information about the states and the information about connectivity; a security-enhancing strategy establishment unit for establishing a security-enhancing strategy based on the attack graph; and a security-enhancing strategy implementation unit for delivering a measure based on the security-enhancing strategy to a corresponding host, thereby taking a security-enhancing measure.
-
公开(公告)号:US20200099704A1
公开(公告)日:2020-03-26
申请号:US16578511
申请日:2019-09-23
Inventor: Joo Young LEE , Ki Jong KOO , Ik Kyun KIM , Dae Sung MOON , Kyung Min PARK , Samuel WOO , Ho HWANG
Abstract: Disclosed are a method and apparatus for searching for an attack path. The apparatus generates an attack graph, generates an attack graph ontology, generates a semantic attack graph by imparting semantics to the attack graph on the basis of the attack graph ontology, and searches for the attack path on the basis of the semantic attack graph.
-
-