会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明申请
    • LOG-BASED TRACEBACK SYSTEM AND METHOD USING CENTROID DECOMPOSITION TECHNIQUE
    • 基于LOG的跟踪系统和使用中心分解技术的方法
    • US20100212013A1
    • 2010-08-19
    • US12669633
    • 2007-11-21
    • Jong Hyun KimGeon Lyang KimSeon Gyoung SohnBeom Hwan ChangChi Yoon JeongJong Ho RyuJung Chan NaJong Soo JangSung Won Sohn
    • Jong Hyun KimGeon Lyang KimSeon Gyoung SohnBeom Hwan ChangChi Yoon JeongJong Ho RyuJung Chan NaJong Soo JangSung Won Sohn
    • G06F11/34
    • H04L45/00H04L45/12H04L63/1416H04L63/1425H04L63/1441H04L2463/146
    • There are provided a system and method for tracing back an attacker by using centroid decomposition technique, the system including: a log data input module collecting log data of an intrusion alarm from an intrusion detection system; a centroid node detection module generating a shortest path tree by applying a shortest path algorithm to network router connection information collected by a network administration server, detecting a centroid node by applying centroid decomposition technique removing a leaf-node to the shortest path tree, and generating a centroid tree whose node of each level is the detected centroid node; and a traceback processing module requesting log data of a router matched with the node of each level of the centroid tree, and tracing back a router identical to the log data of the collected intrusion alarm as a router connected to a source of an attacker by comparing the log data of the router with the log data of the collected intrusion alarm. According to the system and method, an attacker causing a security intrusion event may be quickly detected, a load on the system is reduced, and a passage host exposed to a danger or having weaknesses may be easily recognized, thereby easily coping with an attack.
    • 提供了一种通过使用质心分解技术跟踪攻击者的系统和方法,该系统包括:日志数据输入模块,从入侵检测系统收集入侵警报的日志数据; 质心节点检测模块,通过对网络管理服务器收集的网络路由器连接信息应用最短路径算法,生成最短路径树,通过应用质心分解技术检测质心节点,去除叶节点到最短路径树,并生成 每个级别的节点是检测到的质心节点的质心树; 以及回溯处理模块,请求与质心树的每个级别的节点匹配的路由器的日志数据,并且通过比较来跟踪与收集的入侵警报器的日志数据相同的路由器作为连接到攻击者的源的路由器 路由器的日志数据与收集的入侵报警的日志数据。 根据系统和方法,可以快速地检测到导致安全入侵事件的攻击者,系统上的负载减少,并且易于识别暴露于危险或具有弱点的通道主机,从而容易地应对攻击。
    • 13. 发明授权
    • Method and apparatus for distinguishing obscene video using visual feature
    • 使用视觉特征区分淫秽视频的方法和装置
    • US07773809B2
    • 2010-08-10
    • US11442565
    • 2006-05-26
    • Seung Min LeeTaek Yong NamJong Soo JangHo Gyun Lee
    • Seung Min LeeTaek Yong NamJong Soo JangHo Gyun Lee
    • G06K9/00G06K9/46G06K9/62G10L15/06G04H60/32
    • G06K9/00711G06K9/4652
    • A method and apparatus for generating discriminant functions for distinguishing obscene videos by using visual features of video data, and a method and apparatus for determining whether videos are obscene by using the generated discriminant functions, are provided. The method of generating discriminant functions includes: creating a first frame set by extracting a predetermined number of frames for each video data unit from a group of video data classified as obscene or non-obscene, and creating a second frame set by selecting the frames; generating a frame based discriminant function by extracting visual features of frames of the second frame set, and then generating a first discriminant value by determining whether each frame of the first frame set contains obscene video data; generating a group frame based discriminant function by extracting visual features of a group of frames of the first frame set, and then generating a second discriminant value by determining whether the frames of the group contain obscene video data; and generating a synthetic discriminant function by using the first and second discriminant values as a representative value of the video data. Accordingly, obscene video data stored in a computer system can be automatically and accurately distinguished.
    • 提供一种用于通过使用视频数据的视觉特征来产生用于区分淫秽视频的判别函数的方法和装置,以及用于通过使用所生成的判别函数来确定视频是淫秽的方法和装置。 产生判别函数的方法包括:通过从分类为淫秽或非淫秽的一组视频数据中提取每个视频数据单元的预定数量的帧来创建第一帧集合,并通过选择帧来创建第二帧集合; 通过提取第二帧集合的帧的视觉特征,生成基于帧的判别函数,然后通过确定第一帧集合的每个帧是否包含淫秽视频数据来生成第一判别值; 通过提取第一帧集合的帧组的视觉特征,生成基于组帧的判别函数,然后通过确定该组的帧是否包含淫秽视频数据来生成第二判别式值; 以及通过使用第一和第二判别值作为视频数据的代表值来产生合成判别函数。 因此,可以自动且准确地区分存储在计算机系统中的淫秽视频数据。
    • 14. 发明授权
    • Method and apparatus for storing intrusion rule
    • 存储入侵规则的方法和装置
    • US07735137B2
    • 2010-06-08
    • US11484257
    • 2006-07-10
    • Kwang Ho BaikByoung Koo KimJin Tae OhJong Soo JangSung Won Sohn
    • Kwang Ho BaikByoung Koo KimJin Tae OhJong Soo JangSung Won Sohn
    • G06F11/00G06F12/14G06F12/16G08B23/00
    • H04L63/1416
    • A method and apparatus for storing an intrusion rule are provided. The method stores a new intrusion rule in an intrusion detection system having already stored intrusion rules, and includes: generating combinations of divisions capable of dividing the new intrusion rule into a plurality of partial intrusion rules; calculating the frequency of hash value collisions between each of the generated division combinations and the already stored intrusion rules; dividing the new intrusion rule according to the division combination which has the lowest calculated frequency of hash value collisions; and storing the divided new intrusion rule in a corresponding position of the intrusion detection system. According to the method and apparatus, the size of the storage unit occupied by the intrusion rule can be reduced, and by performing pattern matching, the performance of the intrusion detection system can be enhanced.
    • 提供了一种用于存储入侵规则的方法和装置。 该方法在已经存储了入侵规则的入侵检测系统中存储新的入侵规则,并且包括:生成能够将新的入侵规则划分成多个部分入侵规则的分割组合; 计算每个生成的分割组合与已经存储的入侵规则之间的散列值冲突的频率; 根据哈希值碰撞计算频率最低的划分组合划分新的入侵规则; 并将分割的新入侵规则存储在入侵检测系统的相应位置。 根据该方法和装置,可以减少入侵规则占用的存储单元的大小,通过执行模式匹配,能够提高入侵检测系统的性能。
    • 15. 发明授权
    • Method of storing pattern matching policy and method of controlling alert message
    • 存储模式匹配策略的方法和控制报警信息的方法
    • US07735128B2
    • 2010-06-08
    • US11635245
    • 2006-12-07
    • Byoung Koo KimKwang Ho BaikJin Tae OhJong Soo JangSung Won Sohn
    • Byoung Koo KimKwang Ho BaikJin Tae OhJong Soo JangSung Won Sohn
    • G06F9/00G06F7/04H04L9/00
    • H04L12/5602
    • A method of storing a pattern matching policy and a method of controlling an alert message are provided. The method includes (a) generating a content structure as a sub-structure of a header combination structure of a stored traffic pattern which is a policy to be newly applied to a pattern matching apparatus; (b) determining whether a content of the stored traffic pattern is identical to a content of an original traffic pattern stored in advance in the pattern matching apparatus; (c) allocating a content index of the content of the original traffic pattern to the content of the stored traffic pattern if the content of the stored traffic pattern is identical to the content of the original traffic pattern; and (d) determining whether a header combination structure of the original traffic pattern comprises only one content structure or more than one content structure and allocating a header index of the header combination structure of the stored traffic pattern to the header combination structure of the original traffic pattern if the header combination structure of the original traffic pattern is found to comprise only one content structure. Accordingly, it is possible to efficiently use hardware memories with limited storage capacities and effectively perform a pattern matching function.
    • 提供了一种存储模式匹配策略的方法和一种控制警报消息的方法。 该方法包括:(a)生成内容结构作为作为新应用于模式匹配装置的策略的存储的流量模式的头部组合结构的子结构; (b)确定存储的业务模式的内容是否与预先存储在模式匹配装置中的原始业务模式的内容相同; (c)如果存储的业务模式的内容与原始业务模式的内容相同,则将原始业务模式的内容的内容索引分配给所存储的业务模式的内容; 和(d)确定原始业务模式的报头组合结构是否仅包含一个内容结构或多于一个内容结构,并且将所存储的业务模式的报头组合结构的报头索引分配给原始业务的报头组合结构 如果发现原始流量模式的头组合结构仅包含一个内容结构,则模式。 因此,可以有效地使用具有有限存储容量的硬件存储器并且有效地执行模式匹配功能。