APPARATUS AND METHOD FOR SAMPLING SECURITY EVENT BASED ON CONTENTS OF THE SECURITY EVENT
    1.
    发明申请
    APPARATUS AND METHOD FOR SAMPLING SECURITY EVENT BASED ON CONTENTS OF THE SECURITY EVENT 有权
    基于安全事件内容采集安全事件的装置和方法

    公开(公告)号:US20110016208A1

    公开(公告)日:2011-01-20

    申请号:US12667130

    申请日:2007-11-19

    IPC分类号: G06F15/173

    CPC分类号: H04L63/1416 G06Q10/06

    摘要: There are provided an apparatus and method for sampling a security event based on contents of the security event, the apparatus including: a security event accumulation module collecting security events occurring in a network system and storing the security events for each type according to contents of the security event; a security event analysis module calculating distribution of the security events for each type by analyzing the stored security events; and a security event extraction module sampling the stored security events according to the calculated distribution of the security events for each type. The apparatus and method may improve speed of visualization of a security event and a security event analysis apparatus and may increase accuracy thereof.

    摘要翻译: 提供了一种基于安全事件的内容对安全事件进行采样的装置和方法,该装置包括:安全事件累积模块,其收集网络系统中发生的安全事件,并根据所述安全事件的内容存储每种类型的安全事件 安全事件; 安全事件分析模块,通过分析存储的安全事件来计算每种类型的安全事件的分布; 并且安全事件提取模块根据计算出的每种类型的安全事件的分布来对存储的安全事件进行采样。 该装置和方法可以提高安全事件和安全事件分析装置的可视化速度并且可以提高其精度。

    APPARATUS AND METHOD FOR DISPLAYING STATE OF NETWORK
    2.
    发明申请
    APPARATUS AND METHOD FOR DISPLAYING STATE OF NETWORK 审中-公开
    用于显示网络状态的装置和方法

    公开(公告)号:US20100150008A1

    公开(公告)日:2010-06-17

    申请号:US12530193

    申请日:2008-03-07

    IPC分类号: H04L12/26

    摘要: There are provided a network state display apparatus and method capable of easily determining a present network security state in real time by analyzing an abnormality and harmful traffic deteriorating performance of a network in software by using a result of combining essential characteristics of traffic, a distinct dispersion, and an entropy and displaying the network state to be intuitionally recognized, the method including selecting and combining three of a source address, a source port, a destination address, and a destination port of collected traffic and calculating a distinct dispersion and an entropy of a residual one therefrom; displaying the calculated distinct dispersion and entropy on a security radar where the distinct dispersion and the entropy are assigned to an angle and a radius; determining whether a network state is abnormal, based on a result displayed on the security radar; and detecting reporting detailed information on abnormal traffic causing the abnormal network state.

    摘要翻译: 提供了一种网络状态显示装置和方法,其能够通过使用组合业务的基本特征的结果分析软件中的网络的异常和有害的业务恶化的性能来实时地容易地确定当前的网络安全状态,不同的分散 以及熵并显示要直观识别的网络状态,所述方法包括选择和组合收集的业务的源地址,源端口,目的地地址和目的地端口中的三个,并计算不同的色散和熵 剩余的一个; 在安全雷达上显示计算出的不同色散和熵,其中明确的色散和熵分配给角度和半径; 基于安全雷达上显示的结果,确定网络状态是否异常; 检测异常网络状态异常报告的详细信息。

    Apparatus and method for sampling security events based on contents of the security events
    3.
    发明授权
    Apparatus and method for sampling security events based on contents of the security events 有权
    基于安全事件内容对安全事件进行采样的装置和方法

    公开(公告)号:US08140671B2

    公开(公告)日:2012-03-20

    申请号:US12667130

    申请日:2007-11-19

    IPC分类号: G06F15/173

    CPC分类号: H04L63/1416 G06Q10/06

    摘要: There are provided an apparatus and method for sampling a security event based on contents of the security event, the apparatus including: a security event accumulation module collecting security events occurring in a network system and storing the security events for each type according to contents of the security event; a security event analysis module calculating distribution of the security events for each type by analyzing the stored security events; and a security event extraction module sampling the stored security events according to the calculated distribution of the security events for each type. The apparatus and method may improve speed of visualization of a security event and a security event analysis apparatus and may increase accuracy thereof.

    摘要翻译: 提供了一种基于安全事件的内容对安全事件进行采样的装置和方法,该装置包括:安全事件累积模块,其收集网络系统中发生的安全事件,并根据所述安全事件的内容存储每种类型的安全事件 安全事件; 安全事件分析模块,通过分析存储的安全事件来计算每种类型的安全事件的分布; 并且安全事件提取模块根据计算出的每种类型的安全事件的分布来对存储的安全事件进行采样。 该装置和方法可以提高安全事件和安全事件分析装置的可视化速度并且可以提高其精度。

    Log-based traceback system and method using centroid decomposition technique
    6.
    发明授权
    Log-based traceback system and method using centroid decomposition technique 有权
    基于Log的追溯系统和使用重心分解技术的方法

    公开(公告)号:US08307441B2

    公开(公告)日:2012-11-06

    申请号:US12669633

    申请日:2007-11-21

    IPC分类号: G06F11/34

    摘要: There are provided a system and method for tracing back an attacker by using centroid decomposition technique, the system including: a log data input module collecting log data of an intrusion alarm from an intrusion detection system; a centroid node detection module generating a shortest path tree by applying a shortest path algorithm to network router connection information collected by a network administration server, detecting a centroid node by applying centroid decomposition technique removing a leaf-node to the shortest path tree, and generating a centroid tree whose node of each level is the detected centroid node; and a traceback processing module requesting log data of a router matched with the node of each level of the centroid tree, and tracing back a router identical to the log data of the collected intrusion alarm as a router connected to a source of an attacker by comparing the log data of the router with the log data of the collected intrusion alarm. According to the system and method, an attacker causing a security intrusion event may be quickly detected, a load on the system is reduced, and a passage host exposed to a danger or having weaknesses may be easily recognized, thereby easily coping with an attack.

    摘要翻译: 提供了一种通过使用质心分解技术跟踪攻击者的系统和方法,该系统包括:日志数据输入模块,从入侵检测系统收集入侵警报的日志数据; 质心节点检测模块,通过对网络管理服务器收集的网络路由器连接信息应用最短路径算法,生成最短路径树,通过应用质心分解技术检测质心节点,去除叶节点到最短路径树,并生成 每个级别的节点是检测到的质心节点的质心树; 以及回溯处理模块,请求与质心树的每个级别的节点匹配的路由器的日志数据,并且通过比较来跟踪与收集的入侵警报器的日志数据相同的路由器作为连接到攻击者的源的路由器 路由器的日志数据与收集的入侵报警的日志数据。 根据系统和方法,可以快速地检测到导致安全入侵事件的攻击者,系统上的负载减少,并且易于识别暴露于危险或具有弱点的通道主机,从而容易地应对攻击。

    LOG-BASED TRACEBACK SYSTEM AND METHOD USING CENTROID DECOMPOSITION TECHNIQUE
    7.
    发明申请
    LOG-BASED TRACEBACK SYSTEM AND METHOD USING CENTROID DECOMPOSITION TECHNIQUE 有权
    基于LOG的跟踪系统和使用中心分解技术的方法

    公开(公告)号:US20100212013A1

    公开(公告)日:2010-08-19

    申请号:US12669633

    申请日:2007-11-21

    IPC分类号: G06F11/34

    摘要: There are provided a system and method for tracing back an attacker by using centroid decomposition technique, the system including: a log data input module collecting log data of an intrusion alarm from an intrusion detection system; a centroid node detection module generating a shortest path tree by applying a shortest path algorithm to network router connection information collected by a network administration server, detecting a centroid node by applying centroid decomposition technique removing a leaf-node to the shortest path tree, and generating a centroid tree whose node of each level is the detected centroid node; and a traceback processing module requesting log data of a router matched with the node of each level of the centroid tree, and tracing back a router identical to the log data of the collected intrusion alarm as a router connected to a source of an attacker by comparing the log data of the router with the log data of the collected intrusion alarm. According to the system and method, an attacker causing a security intrusion event may be quickly detected, a load on the system is reduced, and a passage host exposed to a danger or having weaknesses may be easily recognized, thereby easily coping with an attack.

    摘要翻译: 提供了一种通过使用质心分解技术跟踪攻击者的系统和方法,该系统包括:日志数据输入模块,从入侵检测系统收集入侵警报的日志数据; 质心节点检测模块,通过对网络管理服务器收集的网络路由器连接信息应用最短路径算法,生成最短路径树,通过应用质心分解技术检测质心节点,去除叶节点到最短路径树,并生成 每个级别的节点是检测到的质心节点的质心树; 以及回溯处理模块,请求与质心树的每个级别的节点匹配的路由器的日志数据,并且通过比较来跟踪与收集的入侵警报器的日志数据相同的路由器作为连接到攻击者的源的路由器 路由器的日志数据与收集的入侵报警的日志数据。 根据系统和方法,可以快速地检测到导致安全入侵事件的攻击者,系统上的负载减少,并且易于识别暴露于危险或具有弱点的通道主机,从而容易地应对攻击。

    Apparatus and method of detecting network attack situation
    8.
    发明授权
    Apparatus and method of detecting network attack situation 有权
    检测网络攻击情况的方法及装置

    公开(公告)号:US07596810B2

    公开(公告)日:2009-09-29

    申请号:US11081682

    申请日:2005-03-17

    IPC分类号: G08B23/00 G06F15/173

    摘要: Provided is an apparatus for detecting a network attack situation. The apparatus includes an alarm receiver receiving a plurality of alarms raised in a network to which the alarm receiver is connected, converting the alarms into predetermined alarm data, and outputting the alarm data; an alarm processor analyzing an attack situation in the network based on attributes of the alarm data and a number of times that the alarm data is generated; a memory storing basic data needed to analyze the state of the network and providing the basic data to the alarm processor; and an interface transmitting the result of the analysis by the alarm processor to an external device, receiving a predetermined critical value from the external device, which is a basis for determining the occurrence of the attack situation, and outputting the critical value to the alarm processor such that the alarm processor can store the critical value in the memory. Equal numbers of hash engines and detection engines for processing the alarms in the network to the number of data groups classified as network attack situations are formed in a line. Therefore, a network attack situation can be detected in real time based on a great number of alarms indicating intrusion detection.

    摘要翻译: 提供了一种用于检测网络攻击情况的装置。 该装置包括接收在连接有报警接收器的网络中升起的多个报警的报警接收机,将报警转换成预定报警数据,并输出报警数据; 报警处理器根据报警数据的属性和产生报警数据的次数分析网络中的攻击情况; 存储器,用于存储分析网络状态并将基本数据提供给报警处理器所需的基本数据; 以及将所述报警处理器的分析结果发送到外部设备的接口,从外部设备接收预定的临界值,所述临时值是用于确定所述攻击情况的发生的基础,并且将所述临界值输出到所述报警处理器 使得报警处理器可以将临界值存储在存储器中。 在网络中形成等同数量的散列引擎和检测引擎,用于将网络中的警报处理为分类为网络攻击情况的数据组的数量。 因此,可以基于大量表示入侵检测的告警来实时检测网络攻击情况。

    APPARATUS AND METHOD OF DETECTING NETWORK ATTACK SITUATION
    9.
    发明申请
    APPARATUS AND METHOD OF DETECTING NETWORK ATTACK SITUATION 审中-公开
    检测网络攻击状况的装置和方法

    公开(公告)号:US20090094699A1

    公开(公告)日:2009-04-09

    申请号:US12275906

    申请日:2008-11-21

    IPC分类号: G06F15/18 G08B23/00

    摘要: Provided is an apparatus for detecting a network attack situation. The apparatus includes an alarm receiver receiving a plurality of alarms raised in a network to which the alarm receiver is connected, converting the alarms into predetermined alarm data, and outputting the alarm data; an alarm processor analyzing an attack situation in the network based on attributes of the alarm data and a number of times that the alarm data is generated; a memory storing basic data needed to analyze the state of the network and providing the basic data to the alarm processor; and an interface transmitting the result of the analysis by the alarm processor to an external device, receiving a predetermined critical value from the external device, which is a basis for determining the occurrence of the attack situation, and outputting the critical value to the alarm processor such that the alarm processor can store the critical value in the memory. Equal numbers of hash engines and detection engines for processing the alarms in the network to the number of data groups classified as network attack situations are formed in a line. Therefore, a network attack situation can be detected in real time based on a great number of alarms indicating intrusion detection.

    摘要翻译: 提供了一种用于检测网络攻击情况的装置。 该装置包括接收在连接有报警接收器的网络中升起的多个报警的报警接收机,将报警转换成预定报警数据,并输出报警数据; 报警处理器根据报警数据的属性和产生报警数据的次数分析网络中的攻击情况; 存储器,用于存储分析网络状态并将基本数据提供给报警处理器所需的基本数据; 以及将所述报警处理器的分析结果发送到外部设备的接口,从外部设备接收预定的临界值,所述临时值是用于确定所述攻击情况的发生的基础,并且将所述临界值输出到所述报警处理器 使得报警处理器可以将临界值存储在存储器中。 在网络中形成等同数量的散列引擎和检测引擎,用于将网络中的警报处理为分类为网络攻击情况的数据组的数量。 因此,可以基于大量表示入侵检测的告警来实时检测网络攻击情况。

    Network status display device and method using traffic flow-radar
    10.
    发明授权
    Network status display device and method using traffic flow-radar 有权
    网络状态显示装置及方法采用交通流雷达

    公开(公告)号:US07787394B2

    公开(公告)日:2010-08-31

    申请号:US11599909

    申请日:2006-11-15

    IPC分类号: H04L12/66 G01R31/08 H04W36/00

    摘要: A network status display device using a traffic flow-radar is provided. The network status display device includes: a traffic feature extractor calculating flow occupancy rates for total flows, micro-flows and macro-flows with respect to each of a plurality of traffic features with reference to traffic information for each traffic feature such as a network address, a port, a transmitting/receiving host address or a protocol collected by an external traffic information collector, and storing the calculation result; a traffic status display unit displaying the flow occupancy rates for each traffic feature calculated and stored in the traffic feature extractor on a radar with dots for each traffic feature; and a traffic anomaly determination unit determining whether a network status is abnormal with reference to the radar for each traffic feature, detecting and reporting the type of the abnormal network status and harmful or abnormal traffic that generates the abnormal network status, when the abnormal status occurs.

    摘要翻译: 提供了使用交通流量雷达的网络状态显示装置。 网络状态显示装置包括:业务特征提取器,参考每个业务特征(例如网络地址)的业务信息来计算关于多个业务特征中的每一个的总流量,微流量和宏流量的流量占用率 ,端口,发送/接收主机地址或由外部交通信息收集器收集的协议,并存储计算结果; 交通状态显示单元,其显示针对每个交通特征点的雷达上计算并存储在交通特征提取器中的每个交通特征的流量占用率; 以及交通异常判定单元,针对每个流量特征,参照雷达确定网络状态是否异常,检测和报告异常网络状态的类型以及产生异常网络状态的有害或异常流量,当发生异常状态时 。