KR101090815B1 - 데이터 통신 네트워크 상의 공격 검출 방법, 데이터 통신 네트워크 상의 공격 검출 장치, 라우터, 데이터 통신 시스템, 컴퓨터 판독가능 기록 매체 및 클라이언트 시스템 구비 방법 - Google Patents
데이터 통신 네트워크 상의 공격 검출 방법, 데이터 통신 네트워크 상의 공격 검출 장치, 라우터, 데이터 통신 시스템, 컴퓨터 판독가능 기록 매체 및 클라이언트 시스템 구비 방법 Download PDFInfo
- Publication number
- KR101090815B1 KR101090815B1 KR1020077021070A KR20077021070A KR101090815B1 KR 101090815 B1 KR101090815 B1 KR 101090815B1 KR 1020077021070 A KR1020077021070 A KR 1020077021070A KR 20077021070 A KR20077021070 A KR 20077021070A KR 101090815 B1 KR101090815 B1 KR 101090815B1
- Authority
- KR
- South Korea
- Prior art keywords
- message
- user system
- originating user
- data communication
- router
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP05006462 | 2005-03-24 | ||
| EP05006462.5 | 2005-03-24 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| KR20070114155A KR20070114155A (ko) | 2007-11-29 |
| KR101090815B1 true KR101090815B1 (ko) | 2011-12-08 |
Family
ID=36716621
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| KR1020077021070A Expired - Fee Related KR101090815B1 (ko) | 2005-03-24 | 2006-02-21 | 데이터 통신 네트워크 상의 공격 검출 방법, 데이터 통신 네트워크 상의 공격 검출 장치, 라우터, 데이터 통신 시스템, 컴퓨터 판독가능 기록 매체 및 클라이언트 시스템 구비 방법 |
Country Status (9)
| Country | Link |
|---|---|
| US (1) | US20120096548A1 (https=) |
| EP (1) | EP1866725B1 (https=) |
| JP (1) | JP4753264B2 (https=) |
| KR (1) | KR101090815B1 (https=) |
| CN (1) | CN100561492C (https=) |
| AT (1) | ATE485552T1 (https=) |
| CA (1) | CA2600517A1 (https=) |
| DE (1) | DE602006017668D1 (https=) |
| WO (1) | WO2006100613A1 (https=) |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP5476578B2 (ja) * | 2009-01-06 | 2014-04-23 | 独立行政法人情報通信研究機構 | ネットワーク監視システム及びその方法 |
| CN101719906B (zh) * | 2009-11-10 | 2012-05-30 | 电子科技大学 | 一种基于蠕虫传播行为的蠕虫检测方法 |
| US10432587B2 (en) | 2012-02-21 | 2019-10-01 | Aventail Llc | VPN deep packet inspection |
| WO2023233582A1 (ja) * | 2022-06-01 | 2023-12-07 | 日本電信電話株式会社 | 攻撃検知装置、攻撃検知システム、攻撃検知方法および攻撃検知プログラム |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2004107706A1 (en) * | 2003-05-30 | 2004-12-09 | International Business Machines Corporation | Detecting network attacks |
| WO2005015370A1 (en) * | 2003-08-11 | 2005-02-17 | Telecom Italia S.P.A. | Method and system for detecting unauthorised use of a communication network |
Family Cites Families (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP3618245B2 (ja) * | 1999-03-09 | 2005-02-09 | 株式会社日立製作所 | ネットワーク監視システム |
| ATE322790T1 (de) | 2002-01-18 | 2006-04-15 | Stonesoft Corp | Ueberwachung des datenflusses zur verbesserung des netzwerksicherheitsschutzes |
| WO2004008700A2 (en) * | 2002-07-12 | 2004-01-22 | The Penn State Research Foundation | Real-time packet traceback and associated packet marking strategies |
| JP3794491B2 (ja) * | 2002-08-20 | 2006-07-05 | 日本電気株式会社 | 攻撃防御システムおよび攻撃防御方法 |
| JP2004241831A (ja) * | 2003-02-03 | 2004-08-26 | Rbec Corp | ネットワーク管理システム |
| CN1450758A (zh) * | 2003-05-16 | 2003-10-22 | 上海金诺网络安全技术发展股份有限公司 | 高性能网络入侵检测系统和检测方法 |
| JP3828523B2 (ja) * | 2003-07-16 | 2006-10-04 | 株式会社東芝 | 不正アクセス防御装置及びプログラム |
| JP2005051588A (ja) * | 2003-07-30 | 2005-02-24 | Matsushita Electric Ind Co Ltd | 自動フィルタリング方法、および機器 |
| US7992204B2 (en) * | 2004-05-02 | 2011-08-02 | Markmonitor, Inc. | Enhanced responses to online fraud |
| CN1322712C (zh) * | 2004-05-28 | 2007-06-20 | 南京邮电学院 | 一种实现诱骗网络数据流重定向的方法 |
| US7748040B2 (en) * | 2004-07-12 | 2010-06-29 | Architecture Technology Corporation | Attack correlation using marked information |
| JP4680931B2 (ja) * | 2004-10-19 | 2011-05-11 | 富士通株式会社 | 不正アクセスプログラム監視処理方法、不正アクセスプログラム監視プログラムおよび不正アクセスプログラム監視装置 |
| JP4421462B2 (ja) * | 2004-12-06 | 2010-02-24 | 三菱電機株式会社 | 不正侵入検知システムおよび管理装置 |
-
2006
- 2006-02-21 AT AT06727631T patent/ATE485552T1/de not_active IP Right Cessation
- 2006-02-21 EP EP06727631A patent/EP1866725B1/en not_active Expired - Lifetime
- 2006-02-21 CN CNB2006800091644A patent/CN100561492C/zh not_active Expired - Fee Related
- 2006-02-21 WO PCT/IB2006/050554 patent/WO2006100613A1/en not_active Ceased
- 2006-02-21 JP JP2008502525A patent/JP4753264B2/ja not_active Expired - Fee Related
- 2006-02-21 CA CA002600517A patent/CA2600517A1/en not_active Abandoned
- 2006-02-21 US US11/909,495 patent/US20120096548A1/en not_active Abandoned
- 2006-02-21 KR KR1020077021070A patent/KR101090815B1/ko not_active Expired - Fee Related
- 2006-02-21 DE DE602006017668T patent/DE602006017668D1/de not_active Expired - Lifetime
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2004107706A1 (en) * | 2003-05-30 | 2004-12-09 | International Business Machines Corporation | Detecting network attacks |
| WO2005015370A1 (en) * | 2003-08-11 | 2005-02-17 | Telecom Italia S.P.A. | Method and system for detecting unauthorised use of a communication network |
Also Published As
| Publication number | Publication date |
|---|---|
| EP1866725B1 (en) | 2010-10-20 |
| DE602006017668D1 (de) | 2010-12-02 |
| CA2600517A1 (en) | 2006-09-28 |
| WO2006100613A1 (en) | 2006-09-28 |
| KR20070114155A (ko) | 2007-11-29 |
| JP4753264B2 (ja) | 2011-08-24 |
| EP1866725A1 (en) | 2007-12-19 |
| ATE485552T1 (de) | 2010-11-15 |
| US20120096548A1 (en) | 2012-04-19 |
| JP2008535304A (ja) | 2008-08-28 |
| CN100561492C (zh) | 2009-11-18 |
| CN101147153A (zh) | 2008-03-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10476891B2 (en) | Monitoring access of network darkspace | |
| US9444835B2 (en) | Method for tracking machines on a network using multivariable fingerprinting of passively available information | |
| KR100800370B1 (ko) | 어택 서명 생성 방법, 서명 생성 애플리케이션 적용 방법, 컴퓨터 판독 가능 기록 매체 및 어택 서명 생성 장치 | |
| US20040103314A1 (en) | System and method for network intrusion prevention | |
| EP1648114A1 (en) | System and method for monitoring unauthorised network traffic | |
| CN105743878B (zh) | 使用蜜罐的动态服务处理 | |
| KR101156005B1 (ko) | 네트워크 공격 탐지 및 분석 시스템 및 그 방법 | |
| WO2015171780A1 (en) | Distributed system for bot detection | |
| JP2006319982A (ja) | 通信ネットワーク内ワーム特定及び不活化方法及び装置 | |
| US20080028073A1 (en) | Method, a Device, and a System for Protecting a Server Against Denial of DNS Service Attacks | |
| CN108270722A (zh) | 一种攻击行为检测方法和装置 | |
| CN114402567A (zh) | 算法生成的域的在线检测 | |
| Lukaseder et al. | An sdn-based approach for defending against reflective ddos attacks | |
| US20040250158A1 (en) | System and method for protecting an IP transmission network against the denial of service attacks | |
| JP4259183B2 (ja) | 情報処理システム、情報処理装置、プログラム、及び通信ネットワークにおける通信の異常を検知する方法 | |
| KR101090815B1 (ko) | 데이터 통신 네트워크 상의 공격 검출 방법, 데이터 통신 네트워크 상의 공격 검출 장치, 라우터, 데이터 통신 시스템, 컴퓨터 판독가능 기록 매체 및 클라이언트 시스템 구비 방법 | |
| US20250310362A1 (en) | Scalable domain-level sinkholing and interaction of network traffic | |
| US20230370492A1 (en) | Identify and block domains used for nxns-based ddos attack | |
| Jin et al. | Anomaly detection by monitoring unintended dns traffic on wireless network | |
| Wu et al. | Virtual inline: a technique of combining IDS and IPS together in response intrusion | |
| Takemori et al. | Detection of Bot Infected PCs using Destination-based IP and Domain Whitelists during a non-operating term | |
| KR102704755B1 (ko) | 가상 호스트를 이용하여 네트워크에 대한 사이버 위협을 탐지하는 사이버 보안 서비스를 제공하는 방법 및 이를 이용한 사이버 보안 서비스 제공 서버 | |
| KR101080734B1 (ko) | 스푸핑 방지 방법 및 장치 | |
| Selvaraj et al. | Enhancing intrusion detection system performance using firecol protection services based honeypot system | |
| Dimiter et al. | Botnet Attack Identification Based on SDN |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PA0105 | International application |
St.27 status event code: A-0-1-A10-A15-nap-PA0105 |
|
| PG1501 | Laying open of application |
St.27 status event code: A-1-1-Q10-Q12-nap-PG1501 |
|
| A201 | Request for examination | ||
| P11-X000 | Amendment of application requested |
St.27 status event code: A-2-2-P10-P11-nap-X000 |
|
| P13-X000 | Application amended |
St.27 status event code: A-2-2-P10-P13-nap-X000 |
|
| PA0201 | Request for examination |
St.27 status event code: A-1-2-D10-D11-exm-PA0201 |
|
| R18-X000 | Changes to party contact information recorded |
St.27 status event code: A-3-3-R10-R18-oth-X000 |
|
| R18-X000 | Changes to party contact information recorded |
St.27 status event code: A-3-3-R10-R18-oth-X000 |
|
| E902 | Notification of reason for refusal | ||
| PE0902 | Notice of grounds for rejection |
St.27 status event code: A-1-2-D10-D21-exm-PE0902 |
|
| T11-X000 | Administrative time limit extension requested |
St.27 status event code: U-3-3-T10-T11-oth-X000 |
|
| E13-X000 | Pre-grant limitation requested |
St.27 status event code: A-2-3-E10-E13-lim-X000 |
|
| P11-X000 | Amendment of application requested |
St.27 status event code: A-2-2-P10-P11-nap-X000 |
|
| P13-X000 | Application amended |
St.27 status event code: A-2-2-P10-P13-nap-X000 |
|
| P11-X000 | Amendment of application requested |
St.27 status event code: A-2-2-P10-P11-nap-X000 |
|
| P13-X000 | Application amended |
St.27 status event code: A-2-2-P10-P13-nap-X000 |
|
| R17-X000 | Change to representative recorded |
St.27 status event code: A-3-3-R10-R17-oth-X000 |
|
| E902 | Notification of reason for refusal | ||
| PE0902 | Notice of grounds for rejection |
St.27 status event code: A-1-2-D10-D21-exm-PE0902 |
|
| E13-X000 | Pre-grant limitation requested |
St.27 status event code: A-2-3-E10-E13-lim-X000 |
|
| P11-X000 | Amendment of application requested |
St.27 status event code: A-2-2-P10-P11-nap-X000 |
|
| P13-X000 | Application amended |
St.27 status event code: A-2-2-P10-P13-nap-X000 |
|
| E701 | Decision to grant or registration of patent right | ||
| PE0701 | Decision of registration |
St.27 status event code: A-1-2-D10-D22-exm-PE0701 |
|
| GRNT | Written decision to grant | ||
| PR0701 | Registration of establishment |
St.27 status event code: A-2-4-F10-F11-exm-PR0701 |
|
| PR1002 | Payment of registration fee |
St.27 status event code: A-2-2-U10-U12-oth-PR1002 Fee payment year number: 1 |
|
| PG1601 | Publication of registration |
St.27 status event code: A-4-4-Q10-Q13-nap-PG1601 |
|
| LAPS | Lapse due to unpaid annual fee | ||
| PC1903 | Unpaid annual fee |
St.27 status event code: A-4-4-U10-U13-oth-PC1903 Not in force date: 20141202 Payment event data comment text: Termination Category : DEFAULT_OF_REGISTRATION_FEE |
|
| PC1903 | Unpaid annual fee |
St.27 status event code: N-4-6-H10-H13-oth-PC1903 Ip right cessation event data comment text: Termination Category : DEFAULT_OF_REGISTRATION_FEE Not in force date: 20141202 |