摘要:
In a lawful interception system including an interception unit, an application service providing unit, and an Internet access service providing unit, the application service providing unit may receive, from the interception unit, an interception request including interception target information of an interception target. Next, the application service providing unit may transfer a user code corresponding to the received interception target information to the interception unit, and may insert user related information into a packet to be provided to the interception target corresponding to the user code, enabling the packet to be lawfully intercepted. The interception unit may request the Internet access service providing unit for an interception of the packet with respect to the interception target by including the user code.
摘要:
In a lawful interception system including an interception unit, an application service providing unit, and an Internet access service providing unit, the application service providing unit may receive, from the interception unit, an interception request including interception target information of an interception target. Next, the application service providing unit may transfer a user code corresponding to the received interception target information to the interception unit, and may insert user related information into a packet to be provided to the interception target corresponding to the user code, enabling the packet to be lawfully intercepted. The interception unit may request the Internet access service providing unit for an interception of the packet with respect to the interception target by including the user code.
摘要:
A pattern matching system detects strings contained in a target pattern to be detected within a data stream input by 1-byte data, and detects a regular expression representing the target pattern among regular expressions constructed by the detected strings.
摘要:
A pattern matching system detects strings contained in a target pattern to be detected within a data stream input by 1-byte data, and detects a regular expression representing the target pattern among regular expressions constructed by the detected strings.
摘要:
A lawful interception apparatus of a service providing system inquires of a trust server in which a law execution server commissions lawful interception authority whether a terminal that connects to a service connection point is an interception target, determines whether a terminal that connects to a service connection point is an interception target, and if a terminal that connects to a service connection point is an interception target, and the lawful interception apparatus intercepts communication traffic that is related to the terminal.
摘要:
A lawful interception apparatus of a service providing system inquires of a trust server in which a law execution server commissions lawful interception authority whether a terminal that connects to a service connection point is an interception target, determines whether a terminal that connects to a service connection point is an interception target, and if a terminal that connects to a service connection point is an interception target, and the lawful interception apparatus intercepts communication traffic that is related to the terminal.
摘要:
A system for electronic monitoring includes a control server and a plurality of monitoring servers. The control server transmits electronic monitoring instructions including identification information on terminals to a plurality of monitoring servers, respectively, based on information of objects to be monitored stored in a database, receives an object confirmation request message including information on suspect object packets from a first monitoring server among the plurality of monitoring servers, and determines whether the monitoring object terminals correspond to suspect object terminals that transmit or receive the suspect object packets according to the object confirmation request message based on the information on the monitoring objects. When the suspect object terminals are the monitoring object terminals, the control server updates the database based on the information on the suspect object packets.
摘要:
The present invention provides a traceback method including: receiving data including router information according to a path of an attacker; filtering the data to hash the data, and storing the resultant hashed information; determining whether the data is normally received on the basis of the hashed information; and predicting a path loss on the basis of the determination result. Therefore, it is possible to perform an accurate IP traceback using a probabilistic packing marking method and a hash-based traceback method.
摘要:
The present invention relates to a data processing method and system for checking an interactive communication sequence (ICS) relating to a plurality of users in a communication record by using a variable time window, and checking an interactive communication sequence pattern (ICSP) that is a frequently generated interactive communication sequence from among the checked interactive communication sequences. The data processing method includes: (a) storing an inverse pair in a communication record in an interactive communication sequence set or a candidate set that is a set of inverse pairs that can be part of the interactive communication sequence; (b) generating an interactive communication sequence having a length other than 1 by combining interactive communication sequences included in the interactive communication sequence set; and (c) generating an interactive communication sequence having a length other than 1 by combining the inverse pair included in the candidate set and one of the interactive communication sequence included in the interactive communication sequence set of (a) and the interactive communication sequence generated in (b).
摘要:
The present invention relates to a data processing method and system for checking an interactive communication sequence (ICS) relating to a plurality of users in a communication record by using a variable time window, and checking an interactive communication sequence pattern (ICSP) that is a frequently generated interactive communication sequence from among the checked interactive communication sequences. The data processing method includes: (a) storing an inverse pair in a communication record in an interactive communication sequence set or a candidate set that is a set of inverse pairs that can be part of the interactive communication sequence; (b) generating an interactive communication sequence having a length other than 1 by combining interactive communication sequences included in the interactive communication sequence set; and (c) generating an interactive communication sequence having a length other than 1 by combining the inverse pair included in the candidate set and one of the interactive communication sequence included in the interactive communication sequence set of (a) and the interactive communication sequence generated in (b).