-
公开(公告)号:US10225269B2
公开(公告)日:2019-03-05
申请号:US15225560
申请日:2016-08-01
Inventor: Sungwon Yi
Abstract: There are provided a method and an apparatus for detecting attacks and automatically generating attack signatures based on signature merging. A method for detecting attacks and automatically generating attack signatures based on signature merging includes detecting a character string matched to at least one previously stored compressed attack signature in an input packet received from a network, determining whether the character string detected in the primary attack detection is matched to at least one previously stored individual attack signature, and, if the detected character string is matched to the at least one previously stored individual attack signature, determining the input packet as an attack packet, and, if the detected character string is not matched, determining the input packet as a new attack signature.
-
公开(公告)号:US10003444B2
公开(公告)日:2018-06-19
申请号:US15089361
申请日:2016-04-01
Inventor: Kwi Hoon Kim , Young Boo Kim , Hyun Jae Kim , Jin Tae Oh , Woong Shik You , Sungwon Yi
IPC: H04W4/00 , H04L5/00 , H04B7/0413
CPC classification number: H04L5/005 , H04B7/0413 , H04L5/0048 , H04L5/0064
Abstract: Provided herein is a communication method using MIMO (Multiple-Input Multiple-Output) technology for communicating with a terminal included in each of a plurality of base station cells using a communication apparatus, the method including calculating, by the communication apparatus, the number of terminals included inside a base station cell; generating, by the communication apparatus, pilot signals corresponding to the calculated number of terminals; and allocating, by the communication apparatus, the pilot signals to a terminal that may maximize a network capacity based on the generated pilot signals.
-
3.
公开(公告)号:US09130981B2
公开(公告)日:2015-09-08
申请号:US13721236
申请日:2012-12-20
Inventor: Sungwon Yi
IPC: H04L29/06
CPC classification number: H04L63/1416
Abstract: A network security state visualization scheme is suitable for collecting security events existing in a network, analyzing the security events, categorizing and contracting the analyzed security events into attack state information, and visualizing the attack state information as a three-dimensional (3D) screen to display the visualized information on a display panel. Unlike the related art where security events are expressed from the viewpoint of IPs, this scheme normalizes collected security event information, analyzes the normalized information, categorizes and contracts the analyzed information into the attack state information, extracts visualization target data, visualizes the visualization target data as the 3D screen, and displays the visualized 3D screen on the display panel.
Abstract translation: 网络安全状态可视化方案适用于收集网络中存在的安全事件,分析安全事件,将分析的安全事件分类和收缩为攻击状态信息,并将攻击状态信息可视化为三维(3D)屏幕 在显示面板上显示可视化信息。 不同于从IP的角度表达安全事件的相关技术,该方案规范化收集的安全事件信息,分析归一化信息,将分析的信息分类并收集到攻击状态信息中,提取可视化目标数据,可视化目标数据 作为3D屏幕,并在显示面板上显示可视化的3D屏幕。
-
4.
公开(公告)号:US20140013432A1
公开(公告)日:2014-01-09
申请号:US13721236
申请日:2012-12-20
Inventor: Sungwon Yi
IPC: H04L29/06
CPC classification number: H04L63/1416
Abstract: A network security state visualization scheme is suitable for collecting security events existing in a network, analyzing the security events, categorizing and contracting the analyzed security events into attack state information, and visualizing the attack state information as a three-dimensional (3D) screen to display the visualized information on a display panel. Unlike the related art where security events are expressed from the viewpoint of IPs, this scheme normalizes collected security event information, analyzes the normalized information, categorizes and contracts the analyzed information into the attack state information, extracts visualization target data, visualizes the visualization target data as the 3D screen, and displays the visualized 3D screen on the display panel.
Abstract translation: 网络安全状态可视化方案适用于收集网络中存在的安全事件,分析安全事件,将分析的安全事件分类和收缩为攻击状态信息,并将攻击状态信息可视化为三维(3D)屏幕 在显示面板上显示可视化信息。 不同于从IP的角度表达安全事件的相关技术,该方案规范化收集的安全事件信息,分析归一化信息,将分析的信息分类并收集到攻击状态信息中,提取可视化目标数据,可视化目标数据 作为3D屏幕,并在显示面板上显示可视化的3D屏幕。
-
-
-