KR100877664B1 - 어택 검출 방법, 어택 검출 장치, 데이터 통신 네트워크, 컴퓨터 판독 가능 기록 매체 및 침입 검출 애플리케이션의 전개 방법 - Google Patents
어택 검출 방법, 어택 검출 장치, 데이터 통신 네트워크, 컴퓨터 판독 가능 기록 매체 및 침입 검출 애플리케이션의 전개 방법 Download PDFInfo
- Publication number
- KR100877664B1 KR100877664B1 KR1020057018428A KR20057018428A KR100877664B1 KR 100877664 B1 KR100877664 B1 KR 100877664B1 KR 1020057018428 A KR1020057018428 A KR 1020057018428A KR 20057018428 A KR20057018428 A KR 20057018428A KR 100877664 B1 KR100877664 B1 KR 100877664B1
- Authority
- KR
- South Korea
- Prior art keywords
- attack
- data
- address
- network
- data processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (22)
- 데이터 통신 네트워크 내의 데이터 처리 시스템에 할당하기 위한 복수의 어드레스를 구비하는 상기 데이터 통신 네트워크에 대한 어택 검출 방법으로서,임의의 할당된 어드레스(assigned address)에서 발생하여 임의의 비할당 어드레스(unassigned address)로 어드레싱된 데이터 트래픽(data traffic) - 상기 비할당 어드레스는 자유롭고 사용자 데이터 처리 시스템에 할당되지 않은 어드레스임 - 을 네트워크 상에서 식별하는 단계와,상기 식별된 임의의 데이터 트래픽 중에서 어택(attack)을 표시하는 데이터에 대해 검사하는 단계와,상기 어택을 표시하는 데이터가 검출되면 경보 신호(alert signal)를 생성하는 단계를 포함하는 어택 검출 방법.
- 제 1 항에 있어서,상기 검사 단계는 식별된 상기 데이터 트래픽 내에 포함된 요청에 대한 응답을 스푸핑(spoofing)하는 단계를 포함하는 어택 검출 방법.
- 제 1 항에 있어서,상기 경보 신호가 생성되면, 상기 어택을 표시하는 상기 데이터를 발생시키는 상기 데이터 처리 시스템에 할당된 상기 어드레스에서 발생하는 임의의 데이터 트래픽을 상기 네트워크 상의 감염 제거 어드레스(disinfection address)로 재라우팅(rerouting)하는 재라우팅 단계를 더 포함하는 어택 검출 방법.
- 제 1 항에 있어서,상기 경보 신호가 생성되면, 경보 메시지를 상기 감염 제거 어드레스로 전달하는 단계를 포함하는 어택 검출 방법.
- 제 4 항에 있어서,상기 경보 메시지는 검출된 상기 어택을 표시하는 데이터를 포함하는 어택 검출 방법.
- 제 5 항에 있어서,상기 경보 메시지를 수신하면, 상기 어택을 표시하는 상기 데이터를 발생시키는 상기 데이터 처리 시스템에 할당된 상기 어드레스에 대해 상기 감염 제거 어드레스로부터의 경고 메시지(warning message)를 전송하는 단계를 포함하는 어택 검출 방법.
- 삭제
- 데이터 통신 네트워크 내의 데이터 처리 시스템에 할당하기 위한 복수의 어드레스를 구비하는 상기 데이터 통신 네트워크에 대한 어택 검출 장치로서,제 1 항 내지 제 6 항 중 어느 한 항에 따른 방법의 각각의 단계를 수행하는 각각의 수단을 포함하는어택 검출 장치.
- 삭제
- 삭제
- 삭제
- 삭제
- 삭제
- 삭제
- 데이터 통신 네트워크로서,상기 네트워크 내의 데이터 처리 시스템에 할당하기 위한 복수의 어드레스와,제 8 항에 기재된 상기 네트워크에 대한 어택을 검출하는 장치를 포함하는 데이터 통신 네트워크.
- 데이터 처리 시스템의 프로세서 내에 로딩되어, 제 1 항 내지 제 6 항 중 어느 한 항에 따른 데이터 통신 네트워크 상의 어택 검출 방법을 수행하도록 상기 프로세서를 구성하는 컴퓨터 프로그램을 구비한 컴퓨터 판독 가능 기록 매체.
- 삭제
- 삭제
- 삭제
- 삭제
- 객체에 대해 침입 검출 애플리케이션을 전개하는 방법으로서,임의의 할당된 어드레스에서 발생하여 임의의 비할당 어드레스로 어드레싱된 데이터 트래픽 - 상기 비할당 어드레스는 자유롭고 사용자 데이터 처리 시스템에 할당되지 않은 어드레스임 - 을 네트워크 상에서 식별하고, 상기 식별된 임의의 데이터 트래픽 중에서 어택을 표시하는 데이터에 대해 검사하며, 상기 어택을 표시하는 데이터가 검출되면 경보 신호를 생성하기 위해 상기 객체에 의해 이용되는 침입 검출 센서를 네트워크에 접속하는 단계와,상기 경보 신호의 생성에 응답하여, 상기 어택을 표시하는 데이터를 발생시키는 데이터 처리 시스템에 할당된 어드레스에서 발생하는 임의의 데이터 트래픽을 상기 네트워크 상의 감염 제거 어드레스에 대해 재라우팅(rerouting)하는 라우터를 상기 네트워크에 접속하는 단계를 포함하는 침입 검출 애플리케이션의 전개 방법.
- 삭제
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP03405393 | 2003-05-30 | ||
EP03405393.4 | 2003-05-30 |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20060023952A KR20060023952A (ko) | 2006-03-15 |
KR100877664B1 true KR100877664B1 (ko) | 2009-01-12 |
Family
ID=33484075
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020057018428A Expired - Fee Related KR100877664B1 (ko) | 2003-05-30 | 2003-11-20 | 어택 검출 방법, 어택 검출 장치, 데이터 통신 네트워크, 컴퓨터 판독 가능 기록 매체 및 침입 검출 애플리케이션의 전개 방법 |
KR1020057018304A Expired - Fee Related KR100800370B1 (ko) | 2003-05-30 | 2003-11-24 | 어택 서명 생성 방법, 서명 생성 애플리케이션 적용 방법, 컴퓨터 판독 가능 기록 매체 및 어택 서명 생성 장치 |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020057018304A Expired - Fee Related KR100800370B1 (ko) | 2003-05-30 | 2003-11-24 | 어택 서명 생성 방법, 서명 생성 애플리케이션 적용 방법, 컴퓨터 판독 가능 기록 매체 및 어택 서명 생성 장치 |
Country Status (7)
Country | Link |
---|---|
US (4) | US20070094722A1 (ko) |
EP (2) | EP1629651A1 (ko) |
KR (2) | KR100877664B1 (ko) |
CN (2) | CN1771708A (ko) |
AU (2) | AU2003280126A1 (ko) |
TW (1) | TWI333613B (ko) |
WO (2) | WO2004107706A1 (ko) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11483318B2 (en) | 2020-01-07 | 2022-10-25 | International Business Machines Corporation | Providing network security through autonomous simulated environments |
Families Citing this family (74)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004107706A1 (en) * | 2003-05-30 | 2004-12-09 | International Business Machines Corporation | Detecting network attacks |
US7406714B1 (en) | 2003-07-01 | 2008-07-29 | Symantec Corporation | Computer code intrusion detection system based on acceptable retrievals |
US7568229B1 (en) | 2003-07-01 | 2009-07-28 | Symantec Corporation | Real-time training for a computer code intrusion detection system |
US8266177B1 (en) | 2004-03-16 | 2012-09-11 | Symantec Corporation | Empirical database access adjustment |
US7966658B2 (en) * | 2004-04-08 | 2011-06-21 | The Regents Of The University Of California | Detecting public network attacks using signatures and fast content analysis |
US7936682B2 (en) * | 2004-11-09 | 2011-05-03 | Cisco Technology, Inc. | Detecting malicious attacks using network behavior and header analysis |
US8010685B2 (en) * | 2004-11-09 | 2011-08-30 | Cisco Technology, Inc. | Method and apparatus for content classification |
KR100622670B1 (ko) * | 2004-12-07 | 2006-09-19 | 한국전자통신연구원 | 알려지지 않은 네트워크 공격에 대한 실시간 공격 패턴 검출 시스템 및 그 방법 |
US7765596B2 (en) * | 2005-02-09 | 2010-07-27 | Intrinsic Security, Inc. | Intrusion handling system and method for a packet network with dynamic network address utilization |
US7444331B1 (en) | 2005-03-02 | 2008-10-28 | Symantec Corporation | Detecting code injection attacks against databases |
US8095983B2 (en) | 2005-03-15 | 2012-01-10 | Mu Dynamics, Inc. | Platform for analyzing the security of communication protocols and channels |
US8095982B1 (en) | 2005-03-15 | 2012-01-10 | Mu Dynamics, Inc. | Analyzing the security of communication protocols and channels for a pass-through device |
WO2006100613A1 (en) | 2005-03-24 | 2006-09-28 | International Business Machines Corporation | Network attack detection |
US8046374B1 (en) | 2005-05-06 | 2011-10-25 | Symantec Corporation | Automatic training of a database intrusion detection system |
US7558796B1 (en) | 2005-05-19 | 2009-07-07 | Symantec Corporation | Determining origins of queries for a database intrusion detection system |
US7774361B1 (en) * | 2005-07-08 | 2010-08-10 | Symantec Corporation | Effective aggregation and presentation of database intrusion incidents |
US7690037B1 (en) | 2005-07-13 | 2010-03-30 | Symantec Corporation | Filtering training data for machine learning |
US8161548B1 (en) | 2005-08-15 | 2012-04-17 | Trend Micro, Inc. | Malware detection using pattern classification |
US8769663B2 (en) * | 2005-08-24 | 2014-07-01 | Fortinet, Inc. | Systems and methods for detecting undesirable network traffic content |
US7840958B1 (en) * | 2006-02-17 | 2010-11-23 | Trend Micro, Inc. | Preventing spyware installation |
JP4829982B2 (ja) | 2006-02-28 | 2011-12-07 | インターナショナル・ビジネス・マシーンズ・コーポレーション | ピアツーピア通信の検出及び制御 |
US7540766B2 (en) * | 2006-06-14 | 2009-06-02 | Itron, Inc. | Printed circuit board connector for utility meters |
US7881209B2 (en) * | 2006-07-27 | 2011-02-01 | Cisco Technology, Inc. | Method and system for protecting communication networks from physically compromised communications |
KR100809416B1 (ko) * | 2006-07-28 | 2008-03-05 | 한국전자통신연구원 | 보안 시스템을 위한 최적 시그니처 자동 생성 장치 및 방법 |
US7958230B2 (en) | 2008-09-19 | 2011-06-07 | Mu Dynamics, Inc. | Test driven deployment and monitoring of heterogeneous network systems |
US9172611B2 (en) * | 2006-09-01 | 2015-10-27 | Spirent Communications, Inc. | System and method for discovering assets and functional relationships in a network |
US8316447B2 (en) * | 2006-09-01 | 2012-11-20 | Mu Dynamics, Inc. | Reconfigurable message-delivery preconditions for delivering attacks to analyze the security of networked systems |
US7954161B1 (en) | 2007-06-08 | 2011-05-31 | Mu Dynamics, Inc. | Mechanism for characterizing soft failures in systems under attack |
US8510834B2 (en) * | 2006-10-09 | 2013-08-13 | Radware, Ltd. | Automatic signature propagation network |
US8065729B2 (en) | 2006-12-01 | 2011-11-22 | Electronics And Telecommunications Research Institute | Method and apparatus for generating network attack signature |
US8006078B2 (en) * | 2007-04-13 | 2011-08-23 | Samsung Electronics Co., Ltd. | Central processing unit having branch instruction verification unit for secure program execution |
US20080274725A1 (en) * | 2007-05-02 | 2008-11-06 | Ury George Tkachenko | Wireless multifunction network device |
CN103220674B (zh) * | 2007-09-03 | 2015-09-09 | 华为技术有限公司 | 一种终端移动时防止降质攻击的方法、系统及装置 |
US7774637B1 (en) | 2007-09-05 | 2010-08-10 | Mu Dynamics, Inc. | Meta-instrumentation for security analysis |
US8250658B2 (en) * | 2007-09-20 | 2012-08-21 | Mu Dynamics, Inc. | Syntax-based security analysis using dynamically generated test cases |
CN101222513B (zh) * | 2008-01-28 | 2012-06-20 | 杭州华三通信技术有限公司 | 一种防止重复地址检测攻击的方法及网络设备 |
US8732296B1 (en) * | 2009-05-06 | 2014-05-20 | Mcafee, Inc. | System, method, and computer program product for redirecting IRC traffic identified utilizing a port-independent algorithm and controlling IRC based malware |
US8547974B1 (en) | 2010-05-05 | 2013-10-01 | Mu Dynamics | Generating communication protocol test cases based on network traffic |
US8463860B1 (en) | 2010-05-05 | 2013-06-11 | Spirent Communications, Inc. | Scenario based scale testing |
US9106514B1 (en) | 2010-12-30 | 2015-08-11 | Spirent Communications, Inc. | Hybrid network software provision |
US8464219B1 (en) | 2011-04-27 | 2013-06-11 | Spirent Communications, Inc. | Scalable control system for test execution and monitoring utilizing multiple processors |
US8621278B2 (en) | 2011-06-28 | 2013-12-31 | Kaspersky Lab, Zao | System and method for automated solution of functionality problems in computer systems |
NL2007180C2 (en) | 2011-07-26 | 2013-01-29 | Security Matters B V | Method and system for classifying a protocol message in a data communication network. |
US8776241B2 (en) | 2011-08-29 | 2014-07-08 | Kaspersky Lab Zao | Automatic analysis of security related incidents in computer networks |
US8972543B1 (en) | 2012-04-11 | 2015-03-03 | Spirent Communications, Inc. | Managing clients utilizing reverse transactions |
EP2785009A1 (en) | 2013-03-29 | 2014-10-01 | British Telecommunications public limited company | Method and apparatus for detecting a multi-stage event |
EP2785008A1 (en) * | 2013-03-29 | 2014-10-01 | British Telecommunications public limited company | Method and apparatus for detecting a multi-stage event |
US9641542B2 (en) | 2014-07-21 | 2017-05-02 | Cisco Technology, Inc. | Dynamic tuning of attack detector performance |
WO2016014021A1 (en) * | 2014-07-21 | 2016-01-28 | Hewlett-Packard Development Company, L.P. | Security indicator linkage determination |
US9407646B2 (en) | 2014-07-23 | 2016-08-02 | Cisco Technology, Inc. | Applying a mitigation specific attack detector using machine learning |
US9450972B2 (en) | 2014-07-23 | 2016-09-20 | Cisco Technology, Inc. | Network attack detection using combined probabilities |
US20160164886A1 (en) | 2014-10-17 | 2016-06-09 | Computer Sciences Corporation | Systems and methods for threat analysis of computer data |
KR101631242B1 (ko) * | 2015-01-27 | 2016-06-16 | 한국전자통신연구원 | 잠재 디리클레 할당을 이용한 악성 트래픽의 시그니처의 자동화된 식별 방법 및 장치 |
US9531750B2 (en) * | 2015-05-19 | 2016-12-27 | Ford Global Technologies, Llc | Spoofing detection |
KR20170060280A (ko) * | 2015-11-24 | 2017-06-01 | 한국전자통신연구원 | 탐지 규칙 자동 생성 장치 및 방법 |
US10609053B2 (en) * | 2015-11-24 | 2020-03-31 | Intel Corporation | Suspicious network traffic identification method and apparatus |
GB201603118D0 (en) | 2016-02-23 | 2016-04-06 | Eitc Holdings Ltd | Reactive and pre-emptive security system based on choice theory |
US10432652B1 (en) | 2016-09-20 | 2019-10-01 | F5 Networks, Inc. | Methods for detecting and mitigating malicious network behavior and devices thereof |
WO2018122049A1 (en) | 2016-12-30 | 2018-07-05 | British Telecommunications Public Limited Company | Data breach detection |
EP3563548B1 (en) * | 2016-12-30 | 2021-11-03 | British Telecommunications Public Limited Company | Historic data breach detection |
EP3563286A1 (en) * | 2016-12-30 | 2019-11-06 | British Telecommunications Public Limited Company | Attack signature generation |
CN108076038A (zh) * | 2017-06-16 | 2018-05-25 | 哈尔滨安天科技股份有限公司 | 一种基于服务器端口的c&c服务器判断方法及系统 |
US11178174B2 (en) * | 2017-08-02 | 2021-11-16 | CipherTooth, Inc | Detecting man in the middle attacks on a local area network |
US20190098051A1 (en) * | 2017-09-27 | 2019-03-28 | Cox Communications, Inc. | Systems and Methods of Virtual Honeypots |
US10812509B2 (en) * | 2017-10-30 | 2020-10-20 | Micro Focus Llc | Detecting anomolous network activity based on scheduled dark network addresses |
US10855701B2 (en) * | 2017-11-03 | 2020-12-01 | F5 Networks, Inc. | Methods and devices for automatically detecting attack signatures and generating attack signature identifications |
CN110557355B (zh) * | 2018-05-31 | 2021-07-27 | 上海连尚网络科技有限公司 | 一种用于通过用户设备检测中间人攻击的方法与设备 |
US11005868B2 (en) * | 2018-09-21 | 2021-05-11 | Mcafee, Llc | Methods, systems, and media for detecting anomalous network activity |
TWI707565B (zh) * | 2019-04-19 | 2020-10-11 | 國立中央大學 | 網路攻擊者辨識方法及網路系統 |
DE102019220248A1 (de) * | 2019-12-19 | 2021-06-24 | Siemens Mobility GmbH | Übertragungsvorrichtung zum Übertragen von Daten |
US11444961B2 (en) * | 2019-12-20 | 2022-09-13 | Intel Corporation | Active attack detection in autonomous vehicle networks |
CN111507262B (zh) * | 2020-04-17 | 2023-12-08 | 北京百度网讯科技有限公司 | 用于检测活体的方法和装置 |
US11876834B1 (en) * | 2021-08-11 | 2024-01-16 | Rapid7, Inc. | Secure verification of detection rules on test sensors |
US12267299B2 (en) | 2022-01-12 | 2025-04-01 | Bank Of America Corporation | Preemptive threat detection for an information system |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060013491A (ko) * | 2003-05-30 | 2006-02-10 | 인터내셔널 비지네스 머신즈 코포레이션 | 어택 서명 생성 방법, 서명 생성 애플리케이션 적용 방법, 컴퓨터 판독 가능 기록 매체 및 어택 서명 생성 장치 |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR940009702B1 (ko) * | 1989-11-29 | 1994-10-17 | 마쯔시다덴기산교 가부시기가이샤 | 데이터전송장치 |
US5440723A (en) * | 1993-01-19 | 1995-08-08 | International Business Machines Corporation | Automatic immune system for computers and computer networks |
US6275470B1 (en) * | 1999-06-18 | 2001-08-14 | Digital Island, Inc. | On-demand overlay routing for computer-based communication networks |
KR100331219B1 (ko) * | 2000-02-10 | 2002-04-06 | 이상원 | 인터넷 과금방법 및 시스템 |
GB2362076B (en) * | 2000-05-03 | 2002-08-14 | 3Com Corp | Detection of an attack such as a pre-attack on a computer network |
CA2410522C (en) * | 2000-06-30 | 2010-01-26 | Andrea Soppera | Packet data communications |
US20020162017A1 (en) * | 2000-07-14 | 2002-10-31 | Stephen Sorkin | System and method for analyzing logfiles |
AU2001281150A1 (en) * | 2000-08-07 | 2002-02-18 | Xacct Technologies Limited | System, method and computer program product for processing network accounting information |
US6381242B1 (en) * | 2000-08-29 | 2002-04-30 | Netrake Corporation | Content processor |
GB0022485D0 (en) * | 2000-09-13 | 2000-11-01 | Apl Financial Services Oversea | Monitoring network activity |
WO2003050644A2 (en) * | 2001-08-14 | 2003-06-19 | Riverhead Networks Inc. | Protecting against malicious traffic |
JP3461816B2 (ja) * | 2000-11-15 | 2003-10-27 | 株式会社ソニー・コンピュータエンタテインメント | 情報分岐制御方法、通知信号生成方法、プログラム実行装置、処理プログラムが記録された記録媒体、及び処理プログラム |
KR100351306B1 (ko) * | 2001-01-19 | 2002-09-05 | 주식회사 정보보호기술 | 다양한 침입탐지모델을 사용하는 침입탐지시스템 및 그 방법 |
US7290283B2 (en) * | 2001-01-31 | 2007-10-30 | Lancope, Inc. | Network port profiling |
AU2002242043B2 (en) * | 2001-01-31 | 2006-12-14 | Cisco Technology, Inc. | Network port profiling |
US20020116639A1 (en) * | 2001-02-21 | 2002-08-22 | International Business Machines Corporation | Method and apparatus for providing a business service for the detection, notification, and elimination of computer viruses |
WO2002071227A1 (en) * | 2001-03-01 | 2002-09-12 | Cyber Operations, Llc | System and method for anti-network terrorism |
US20020143963A1 (en) * | 2001-03-15 | 2002-10-03 | International Business Machines Corporation | Web server intrusion detection method and apparatus |
US6970920B2 (en) * | 2001-04-11 | 2005-11-29 | International Business Machines Corporation | Methods, systems and computer program products for communicating with unconfigured network devices on remote networks |
US8438241B2 (en) * | 2001-08-14 | 2013-05-07 | Cisco Technology, Inc. | Detecting and protecting against worm traffic on a network |
US7210168B2 (en) * | 2001-10-15 | 2007-04-24 | Mcafee, Inc. | Updating malware definition data for mobile data processing devices |
US7743415B2 (en) * | 2002-01-31 | 2010-06-22 | Riverbed Technology, Inc. | Denial of service attacks characterization |
US20040162994A1 (en) * | 2002-05-13 | 2004-08-19 | Sandia National Laboratories | Method and apparatus for configurable communication network defenses |
US20040148521A1 (en) * | 2002-05-13 | 2004-07-29 | Sandia National Laboratories | Method and apparatus for invisible network responder |
KR20020075319A (ko) * | 2002-07-19 | 2002-10-04 | 주식회사 싸이버텍홀딩스 | 지능형 보안 엔진과 이를 포함하는 지능형 통합 보안 시스템 |
US7017186B2 (en) * | 2002-07-30 | 2006-03-21 | Steelcloud, Inc. | Intrusion detection system using self-organizing clusters |
-
2003
- 2003-11-20 WO PCT/IB2003/005328 patent/WO2004107706A1/en active Application Filing
- 2003-11-20 EP EP03772503A patent/EP1629651A1/en not_active Withdrawn
- 2003-11-20 US US10/558,848 patent/US20070094722A1/en not_active Abandoned
- 2003-11-20 AU AU2003280126A patent/AU2003280126A1/en not_active Abandoned
- 2003-11-20 CN CNA2003801103005A patent/CN1771708A/zh active Pending
- 2003-11-20 KR KR1020057018428A patent/KR100877664B1/ko not_active Expired - Fee Related
- 2003-11-24 US US10/558,853 patent/US20070094728A1/en not_active Abandoned
- 2003-11-24 CN CN200380110301XA patent/CN1771709B/zh not_active Expired - Fee Related
- 2003-11-24 KR KR1020057018304A patent/KR100800370B1/ko not_active Expired - Fee Related
- 2003-11-24 WO PCT/IB2003/005453 patent/WO2004107707A1/en active Application Filing
- 2003-11-24 EP EP03772560A patent/EP1629652A1/en not_active Withdrawn
- 2003-11-24 AU AU2003280190A patent/AU2003280190A1/en not_active Abandoned
-
2004
- 2004-05-03 TW TW093112419A patent/TWI333613B/zh not_active IP Right Cessation
-
2008
- 2008-05-29 US US12/128,834 patent/US8261346B2/en not_active Expired - Fee Related
- 2008-06-02 US US12/131,327 patent/US20080235799A1/en not_active Abandoned
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060013491A (ko) * | 2003-05-30 | 2006-02-10 | 인터내셔널 비지네스 머신즈 코포레이션 | 어택 서명 생성 방법, 서명 생성 애플리케이션 적용 방법, 컴퓨터 판독 가능 기록 매체 및 어택 서명 생성 장치 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11483318B2 (en) | 2020-01-07 | 2022-10-25 | International Business Machines Corporation | Providing network security through autonomous simulated environments |
Also Published As
Publication number | Publication date |
---|---|
KR100800370B1 (ko) | 2008-02-04 |
WO2004107707A1 (en) | 2004-12-09 |
AU2003280126A1 (en) | 2005-01-21 |
US20090070870A1 (en) | 2009-03-12 |
AU2003280190A1 (en) | 2005-01-21 |
US20070094728A1 (en) | 2007-04-26 |
US20070094722A1 (en) | 2007-04-26 |
WO2004107706A1 (en) | 2004-12-09 |
CN1771709B (zh) | 2010-04-07 |
US20080235799A1 (en) | 2008-09-25 |
KR20060013491A (ko) | 2006-02-10 |
CN1771708A (zh) | 2006-05-10 |
TW200428203A (en) | 2004-12-16 |
CN1771709A (zh) | 2006-05-10 |
EP1629651A1 (en) | 2006-03-01 |
TWI333613B (en) | 2010-11-21 |
KR20060023952A (ko) | 2006-03-15 |
US8261346B2 (en) | 2012-09-04 |
EP1629652A1 (en) | 2006-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100877664B1 (ko) | 어택 검출 방법, 어택 검출 장치, 데이터 통신 네트워크, 컴퓨터 판독 가능 기록 매체 및 침입 검출 애플리케이션의 전개 방법 | |
CN109951500B (zh) | 网络攻击检测方法及装置 | |
EP2257024B1 (en) | Method, network apparatus and network system for defending distributed denial of service ddos attack | |
US7373666B2 (en) | Distributed threat management | |
US7444404B2 (en) | Network traffic regulation including consistency based detection and filtering of packets with spoof source addresses | |
US20050108415A1 (en) | System and method for traffic analysis | |
JP2005506736A (ja) | パケットネットワークのルータ内のノードセキュリティを提供するための方法及び装置。 | |
CN108270722B (zh) | 一种攻击行为检测方法和装置 | |
CN108737344B (zh) | 一种网络攻击防护方法和装置 | |
CN1820452A (zh) | 检测并防止网络上的蠕虫流量 | |
JP7102780B2 (ja) | 不正通信対処システム及び方法 | |
JP4159814B2 (ja) | 双方向型ネットワーク侵入検知システムおよび双方向型侵入検知プログラム | |
CN100561492C (zh) | 网络攻击检测的方法和装置 | |
US8234503B2 (en) | Method and systems for computer security | |
CN114070575A (zh) | 设备探测处理方法、装置、电子设备、存储介质和程序 | |
Zhou et al. | Weighted link graphs: a distributed IDS for secondary intrusion detection and defense |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PA0105 | International application |
Patent event date: 20050929 Patent event code: PA01051R01D Comment text: International Patent Application |
|
A201 | Request for examination | ||
AMND | Amendment | ||
PA0201 | Request for examination |
Patent event code: PA02012R01D Patent event date: 20060124 Comment text: Request for Examination of Application |
|
PG1501 | Laying open of application | ||
E902 | Notification of reason for refusal | ||
PE0902 | Notice of grounds for rejection |
Comment text: Notification of reason for refusal Patent event date: 20070326 Patent event code: PE09021S01D |
|
AMND | Amendment | ||
E902 | Notification of reason for refusal | ||
PE0902 | Notice of grounds for rejection |
Comment text: Notification of reason for refusal Patent event date: 20071025 Patent event code: PE09021S01D |
|
AMND | Amendment | ||
E601 | Decision to refuse application | ||
PE0601 | Decision on rejection of patent |
Patent event date: 20080721 Comment text: Decision to Refuse Application Patent event code: PE06012S01D Patent event date: 20071025 Comment text: Notification of reason for refusal Patent event code: PE06011S01I Patent event date: 20070326 Comment text: Notification of reason for refusal Patent event code: PE06011S01I |
|
AMND | Amendment | ||
J201 | Request for trial against refusal decision | ||
PJ0201 | Trial against decision of rejection |
Patent event date: 20081020 Comment text: Request for Trial against Decision on Refusal Patent event code: PJ02012R01D Patent event date: 20080721 Comment text: Decision to Refuse Application Patent event code: PJ02011S01I Appeal kind category: Appeal against decision to decline refusal Decision date: 20081215 Appeal identifier: 2008101010910 Request date: 20081020 |
|
PB0901 | Examination by re-examination before a trial |
Comment text: Amendment to Specification, etc. Patent event date: 20081020 Patent event code: PB09011R02I Comment text: Request for Trial against Decision on Refusal Patent event date: 20081020 Patent event code: PB09011R01I Comment text: Amendment to Specification, etc. Patent event date: 20080325 Patent event code: PB09011R02I Comment text: Amendment to Specification, etc. Patent event date: 20070626 Patent event code: PB09011R02I Comment text: Amendment to Specification, etc. Patent event date: 20060124 Patent event code: PB09011R02I |
|
B701 | Decision to grant | ||
PB0701 | Decision of registration after re-examination before a trial |
Patent event date: 20081215 Comment text: Decision to Grant Registration Patent event code: PB07012S01D Patent event date: 20081120 Comment text: Transfer of Trial File for Re-examination before a Trial Patent event code: PB07011S01I |
|
GRNT | Written decision to grant | ||
PR0701 | Registration of establishment |
Comment text: Registration of Establishment Patent event date: 20081230 Patent event code: PR07011E01D |
|
PR1002 | Payment of registration fee |
Payment date: 20081230 End annual number: 3 Start annual number: 1 |
|
PG1601 | Publication of registration | ||
LAPS | Lapse due to unpaid annual fee | ||
PC1903 | Unpaid annual fee |