Apparatus and method for attack source traceback
    3.
    发明授权
    Apparatus and method for attack source traceback 有权
    攻击源追溯的装置和方法

    公开(公告)号:US09374382B2

    公开(公告)日:2016-06-21

    申请号:US14518623

    申请日:2014-10-20

    CPC classification number: H04L63/1416 H04L63/1466 H04L63/164

    Abstract: An apparatus and a method for an attack source traceback capable of tracing back an attacker, that is, an attack source present behind a command and control (C&C) server in a cyber target attack having non-connectivity over a transmission control protocol (TCP) connection are disclosed. The apparatus for the attack source traceback includes: a server information extracting unit detecting an attack for a system, which is generated via a server to thereby extract information on the server; a traceback agent installing unit installing a traceback agent in the server based on the information on the server; and a traceback unit finding an attack source for the system by analyzing network information of the server obtained by the traceback agent.

    Abstract translation: 一种用于跟踪攻击者的攻击源追溯的装置和方法,即在具有通过传输控制协议(TCP)上的非连接性的网络目标攻击中的命令和控制(C&C)服务器后面的攻击源, 连接被公开。 用于攻击源追溯的装置包括:服务器信息提取单元,其检测经由服务器生成的系统的攻击,从而在服务器上提取信息; 追溯代理安装单元,基于服务器上的信息在服务器中安装回溯代理; 追溯单元通过分析由追溯代理获得的服务器的网络信息来查找系统的攻击源。

    OBJECT VERIFICATION APPARATUS AND ITS INTEGRITY AUTHENTICATION METHOD
    4.
    发明申请
    OBJECT VERIFICATION APPARATUS AND ITS INTEGRITY AUTHENTICATION METHOD 审中-公开
    对象验证装置及其完整性验证方法

    公开(公告)号:US20150121072A1

    公开(公告)日:2015-04-30

    申请号:US14254305

    申请日:2014-04-16

    Abstract: There is provided an object verification apparatus comprising; a communication module receiving object information to verify an object and integrity of the object, and requesting original object information to an integrity authentication server in which the original object information for the object is registered and receiving the original object information from the integrity authentication server; and a control module determining whether current object information extracted from the object and the object information are identical or not, controlling the communication module according to the determined result, and comparing the original object information and the current object information to verify the final integrity of the object.

    Abstract translation: 提供了一种对象验证装置,包括: 接收对象信息以验证对象的对象和完整性的通信模块,以及向对象的原始对象信息进行登记的完整性认证服务器请求原始对象信息,并且从完整性认证服务器接收原始对象信息; 以及控制模块,确定从对象提取的当前对象信息和对象信息是否相同,根据确定的结果控制通信模块,并比较原始对象信息和当前对象信息,以验证对象信息的最终完整性 目的。

    Network environment synchronization apparatus and method

    公开(公告)号:US12026181B2

    公开(公告)日:2024-07-02

    申请号:US17552328

    申请日:2021-12-15

    CPC classification number: G06F16/29 G06F16/2246 G06F16/2255

    Abstract: Disclosed herein are a network environment synchronization apparatus and method. The network environment synchronization apparatus includes one or more processors, and execution memory for storing at least one program that is executed by the one or more processors, wherein the at least one program is configured to collect data from a network environment and generate a management structure in which collected data is distributed into preset respective group units, generate data discriminators for respective group units using a preset hash function, determine whether data of the management structure has changed with reference to data newly collected from the network environment based on the data discriminators, and when it is determined whether data of the management structure has changed, update the data of the management structure with the newly collected data.

    Apparatus and method for detecting distributed reflection denial of service attack

    公开(公告)号:US10693908B2

    公开(公告)日:2020-06-23

    申请号:US15803062

    申请日:2017-11-03

    Abstract: Disclosed herein are an apparatus and method for detecting a Distributed Reflection Denial of Service (DRDoS) attack. The DRDoS attack detection apparatus includes a network flow data reception unit for receiving network flow data from network equipment, a session type determination unit for determining a session type of the received network flow data, a host type determination unit for determining a type of host corresponding to the network flow data based on the session type, an attack method determination unit for determining an attack method corresponding to the network flow data, a protocol identification unit for identifying a protocol of the network flow data, and an attack detection unit for detecting a DRDoS attack based on the session type, the host type, the attack method, and the protocol.

Patent Agency Ranking