Apparatus and method for detecting network attack
    1.
    发明授权
    Apparatus and method for detecting network attack 有权
    网络攻击检测装置及方法

    公开(公告)号:US08095973B2

    公开(公告)日:2012-01-10

    申请号:US11926132

    申请日:2007-10-29

    CPC分类号: H04L63/1408

    摘要: There are provided a network attack detection apparatus and method capable of determining even unknown network attack, the apparatus connected between two networks or connected by port mirroring of an Ethernet switch to real-time monitor all packets flowing through the networks. The apparatus decodes a payload portion of an inputted network packet into a machine code instruction, determines whether an executable code is included in the decoded machine code by analyzing relationship between instructions, and determines whether the packet is harmful based on statistics with respect to a possibility that an executable code exists in a service and a certain transaction of the service when the executable code is included.

    摘要翻译: 提供了能够确定甚至未知网络攻击的网络攻击检测装置和方法,连接在两个网络之间的装置或通过以太网交换机的端口镜像连接的实时监视通过网络流动的所有分组的网络攻击检测装置和方法。 该装置将输入的网络分组的有效载荷部分解码为机器码指令,通过分析指令之间的关系来确定解码的机器码中是否包括可执行代码,并且基于关于可能性的统计来确定分组是否有害 当包括可执行代码时,可执行代码存在于服务和服务的某个事务中。

    METHOD AND APPARATUS FOR MALWARE DETECTION
    2.
    发明申请
    METHOD AND APPARATUS FOR MALWARE DETECTION 审中-公开
    用于恶意软件检测的方法和装置

    公开(公告)号:US20090133125A1

    公开(公告)日:2009-05-21

    申请号:US12209249

    申请日:2008-09-12

    IPC分类号: G06F21/00

    CPC分类号: G06F21/562 G06F21/56

    摘要: The present invention relates to an apparatus and method for detecting malware. The malware detection apparatus and method of the present invention determines whether a file is malware or not by analyzing the header of an executable file. Since the malware detection apparatus and method can quickly detect presence of malware, it can shorten detection time considerably. The malware detection apparatus and method can also detect even unknown malware as well as known malware to thereby estimate and determine presence of malware. Therefore, it is possible to cope with malware in advance, protect a system with a program, and increase security level remarkably.

    摘要翻译: 本发明涉及一种用于检测恶意软件的装置和方法。 本发明的恶意软件检测装置和方法通过分析可执行文件的标题来确定文件是否是恶意软件。 由于恶意软件检测装置和方法可以快速检测恶意软件的存在,因此可以大大缩短检测时间。 恶意软件检测装置和方法还可以检测甚至未知的恶意软件以及已知的恶意软件,从而估计和确定恶意软件的存在。 因此,可以提前应对恶意软件,用程序保护系统,显着提高安全等级。

    APPARATUS AND METHOD FOR DETECTING NETWORK ATTACK
    3.
    发明申请
    APPARATUS AND METHOD FOR DETECTING NETWORK ATTACK 有权
    用于检测网络攻击的装置和方法

    公开(公告)号:US20080134334A1

    公开(公告)日:2008-06-05

    申请号:US11926132

    申请日:2007-10-29

    IPC分类号: G06F11/00

    CPC分类号: H04L63/1408

    摘要: There are provided a network attack detection apparatus and method capable of determining even unknown network attack, the apparatus connected between two networks or connected by port mirroring of an Ethernet switch to real-time monitor all packets flowing through the networks. The apparatus decodes a payload portion of an inputted network packet into a machine code instruction, determines whether an executable code is included in the decoded machine code by analyzing relationship between instructions, and determines whether the packet is harmful based on statistics with respect to a possibility that an executable code exists in a service and a certain transaction of the service when the executable code is included.

    摘要翻译: 提供了能够确定甚至未知网络攻击的网络攻击检测装置和方法,连接在两个网络之间的装置或通过以太网交换机的端口镜像连接的实时监视通过网络流动的所有分组的网络攻击检测装置和方法。 该装置将输入的网络分组的有效载荷部分解码为机器码指令,通过分析指令之间的关系来确定解码的机器码中是否包括可执行代码,并且基于关于可能性的统计来确定分组是否有害 当包括可执行代码时,可执行代码存在于服务和服务的某个事务中。

    Method and apparatus for detecting executable code
    4.
    发明授权
    Method and apparatus for detecting executable code 失效
    用于检测可执行代码的方法和装置

    公开(公告)号:US08166545B2

    公开(公告)日:2012-04-24

    申请号:US12044393

    申请日:2008-03-07

    IPC分类号: G06F11/00

    摘要: There are provided an apparatus and method for detecting an executable code, capable of verifying reliability of an extracted signature by determining whether there is present an executable code in network data by using instruction pattern information related calling mechanism of function for distinguishing the executable code from a non-executable code, the method including: forming instructions by reverse assembling network data suspicious as an attack; comparing the respective formed instructions with instruction patterns according to calling mechanism of function; and determining whether there is present an executable code in the network data according to a result of the comparing.

    摘要翻译: 提供了一种用于检测可执行代码的装置和方法,其能够通过使用指令模式信息相关的调用机制来确定是否存在网络数据中的可执行代码来验证提取的签名的可靠性,以便将可执行代码与 不可执行代码,该方法包括:通过将可疑的网络数据反向组合为攻击来形成指令; 根据功能的调用机制将各形成的指令与指令模式进行比较; 以及根据所述比较的结果确定是否存在所述网络数据中的可执行代码。

    METHOD OF EXTRACTING WINDOWS EXECUTABLE FILE USING HARDWARE BASED ON SESSION MATCHING AND PATTERN MATCHING AND APPRATUS USING THE SAME
    5.
    发明申请
    METHOD OF EXTRACTING WINDOWS EXECUTABLE FILE USING HARDWARE BASED ON SESSION MATCHING AND PATTERN MATCHING AND APPRATUS USING THE SAME 有权
    使用基于会话匹配和图案匹配的硬件提取WINDOWS可执行文件的方法和使用该方法的方法

    公开(公告)号:US20100146621A1

    公开(公告)日:2010-06-10

    申请号:US12503288

    申请日:2009-08-17

    CPC分类号: H04L63/145 G06F21/564

    摘要: A method and apparatus for extracting a windows executable file that can search for a pattern related to windows executable files among a large quantity of network packets using a hardware-based session tracking and pattern matching technology and that can extract all packets included in the corresponding session are provided. The method of extracting a windows executable file includes: collecting incoming packets having a payload according to a session of a reference packet having an MZ pattern; performing a portable executable (PE) pattern matching for the collected incoming packets; and forming a PE file based on at least one incoming packet satisfying the PE pattern matching.

    摘要翻译: 一种用于提取Windows可执行文件的方法和装置,其可以使用基于硬件的会话跟踪和模式匹配技术在大量网络分组中搜索与Windows可执行文件相关的模式,并且可以提取包括在相应会话中的所有分组 被提供。 提取Windows可执行文件的方法包括:根据具有MZ模式的参考分组的会话收集具有有效载荷的传入分组; 对所收集的传入分组执行匹配的便携式可执行(PE)模式; 以及基于满足PE模式匹配的至少一个输入分组形成PE文件。

    Method of extracting windows executable file using hardware based on session matching and pattern matching and apparatus using the same
    6.
    发明授权
    Method of extracting windows executable file using hardware based on session matching and pattern matching and apparatus using the same 有权
    基于会话匹配和模式匹配的硬件提取Windows可执行文件的方法及使用该可执行文件的方法

    公开(公告)号:US08230503B2

    公开(公告)日:2012-07-24

    申请号:US12503288

    申请日:2009-08-17

    IPC分类号: H04L29/06

    CPC分类号: H04L63/145 G06F21/564

    摘要: A method and apparatus for extracting a windows executable file that can search for a pattern related to windows executable files among a large quantity of network packets using a hardware-based session tracking and pattern matching technology and that can extract all packets included in the corresponding session are provided. The method of extracting a windows executable file includes: collecting incoming packets having a payload according to a session of a reference packet having an MZ pattern; performing a portable executable (PE) pattern matching for the collected incoming packets; and forming a PE file based on at least one incoming packet satisfying the PE pattern matching.

    摘要翻译: 一种用于提取Windows可执行文件的方法和装置,其可以使用基于硬件的会话跟踪和模式匹配技术在大量网络分组中搜索与Windows可执行文件相关的模式,并且可以提取包括在相应会话中的所有分组 被提供。 提取Windows可执行文件的方法包括:根据具有MZ模式的参考分组的会话收集具有有效载荷的传入分组; 对所收集的传入分组执行匹配的便携式可执行(PE)模式; 以及基于满足PE模式匹配的至少一个输入分组形成PE文件。

    Real-time stateful packet inspection method and apparatus
    8.
    发明申请
    Real-time stateful packet inspection method and apparatus 有权
    实时状态报文检测方法及装置

    公开(公告)号:US20070297410A1

    公开(公告)日:2007-12-27

    申请号:US11633174

    申请日:2006-12-04

    IPC分类号: H04L12/56

    摘要: A real-time stateful packet inspection method and apparatus is provided, which uses a session table processing method that can efficiently generate state information. In the apparatus, a session table stores session data of a packet received from an external network. A hash key generator hashes a parameter extracted from the received packet and generates a hash pointer of the session table corresponding to the packet. A session detection module searches the session table for a session corresponding to the received packet. A session management module performs management of the session table such as addition, deletion, and change of sessions of the session table. A packet inspection module generates state information corresponding to the received packet from both directionality information of the packet and entry header information of the packet stored in the session table and then inspects the packet based on the generated state information.

    摘要翻译: 提供了一种实时状态包检测方法和装置,其使用可以有效地生成状态信息的会话表处理方法。 在该装置中,会话表存储从外部网络接收到的分组的会话数据。 哈希密钥生成器从接收到的分组中提取参数,并生成与分组对应的会话表的哈希指针。 会话检测模块在会话表中搜索与接收到的分组相对应的会话。 会话管理模块执行会话表的管理,例如会话表的会话的添加,删除和更改。 分组检查模块从分组的方向性信息和存储在会话表中的分组的条目标题信息两者生成对应于接收到的分组的状态信息,然后基于生成的状态信息来检查分组。

    APPARATUS AND METHOD FOR DETECTING DISTRIBUTED DENIAL OF SERVICE ATTACK
    9.
    发明申请
    APPARATUS AND METHOD FOR DETECTING DISTRIBUTED DENIAL OF SERVICE ATTACK 审中-公开
    用于检测分布式服务攻击的装置和方法

    公开(公告)号:US20110016523A1

    公开(公告)日:2011-01-20

    申请号:US12633121

    申请日:2009-12-08

    IPC分类号: G06F11/30 G06F15/16

    CPC分类号: H04L63/1458

    摘要: An apparatus for detecting a distributed denial of service (DDoS) attack includes: a monitoring unit for monitoring multiple GET requests and responses transmitted and received depending on a session establishment between a client and a server; and an attack detection unit for analyzing the monitored multiple GET requests and responses between the client and the server to detect a traffic of the DDoS attack against the server.

    摘要翻译: 一种用于检测分布式拒绝服务(DDoS)攻击的装置,包括:监视单元,用于根据客户端和服务器之间的会话建立来监视多个GET请求和响应发送和接收; 以及攻击检测单元,用于分析所监视的多个GET请求和客户端与服务器之间的响应,以检测针对服务器的DDoS攻击的流量。