会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • NETWORK ATTACK DETECTION DEVICES AND METHODS
    • 网络攻击检测设备和方法
    • US20110185425A1
    • 2011-07-28
    • US12837986
    • 2010-07-16
    • Hahn-Ming LEESi-Yu HUANGJerome YEHChing-Hao MAO
    • Hahn-Ming LEESi-Yu HUANGJerome YEHChing-Hao MAO
    • G06F21/00
    • H04L63/1416H04L29/12066H04L61/1511
    • A network attack detection device is provided, including a spatial coordinate database for storing spatial coordinate data; a standard time zone database for storing standard time zone data; a domain name system packet collector for collecting a domain name system packet; a spatial snapshot feature extractor for extracting internet protocol address corresponding to the domain name system packet according to the domain name system packet, and generating spatial feature data corresponding to the internet protocol address according to the internet protocol address, the spatial coordinate data and the standard time zone data; and an attack detector for determining whether the domain name system packet is an attack according to the spatial feature data and a spatial snapshot detection model, and when determining that the domain name system packet is an attack, sending a warning to indicate the attack.
    • 提供一种网络攻击检测装置,包括用于存储空间坐标数据的空间坐标数据库; 用于存储标准时区数据的标准时区数据库; 用于收集域名系统包的域名系统包收集器; 空间快照特征提取器,用于根据域名系统分组提取与域名系统分组对应的互联网协议地址,并根据因特网协议地址,空间坐标数据和标准产生与互联网协议地址对应的空间特征数据 时区数据; 以及用于根据空间特征数据和空间快照检测模型来确定域名系统分组是否是攻击的攻击检测器,并且当确定域名系统分组是攻击时,发送指示攻击的警告。
    • 2. 发明申请
    • BOTNET EARLY DETECTION USING HYBRID HIDDEN MARKOV MODEL ALGORITHM
    • BOTNET早期检测使用混合隐马尔可夫模型算法
    • US20110004936A1
    • 2011-01-06
    • US12726272
    • 2010-03-17
    • Hahn-Ming LeeChing-Hao MaoYu-Jie ChenYi-Hsun WangJerome YehTsu-Han Chen
    • Hahn-Ming LeeChing-Hao MaoYu-Jie ChenYi-Hsun WangJerome YehTsu-Han Chen
    • G06F21/00
    • H04L63/1441H04L2463/144
    • A botnet detection system is provided. A bursty feature extractor receives an Internet Relay Chat (IRC) packet value from a detection object network, and determines a bursty feature accordingly. A Hybrid Hidden Markov Model (HHMM) parameter estimator determines probability parameters for a Hybrid Hidden Markov Model according to the bursty feature. A traffic profile generator establishes a probability sequential model for the Hybrid Hidden Markov Model according to the probability parameters and pre-defined network traffic categories. A dubious state detector determines a traffic state corresponding to a network relaying the IRC packet in response to reception of a new IRC packet, determines whether the IRC packet flow of the object network is dubious by applying the bursty feature to the probability sequential model for the Hybrid Hidden Markov Model, and generates a warning signal when the IRC packet flow is regarded as having a dubious traffic state.
    • 提供僵尸网络检测系统。 突发特征提取器从检测对象网络接收因特网中继聊天(IRC)分组值,并相应地确定突发特征。 混合隐马尔可夫模型(HHMM)参数估计器根据突发特征确定混合隐马尔可夫模型的概率参数。 流量简档生成器根据概率参数和预定义的网络流量类别建立混合隐马尔可夫模型的概率序列模型。 可疑状态检测器响应于接收到新的IRC分组而确定与中继IRC分组的网络相对应的业务状态,通过将突发特征应用于概率序列模型来确定对象网络的IRC分组流是否可疑, 混合隐马尔可夫模型,并且当IRC分组流被认为具有可疑业务状态时,生成警告信号。
    • 4. 发明申请
    • Method and System for Tracing Domain Names and Computer Readable Storage Medium Storing the Method
    • 跟踪域名和计算机可读存储介质的方法和系统存储方法
    • US20130268675A1
    • 2013-10-10
    • US13544068
    • 2012-07-09
    • Meng-Han TsaiChang-Cheng LinKai-Chi ChangChing-Hao Mao
    • Meng-Han TsaiChang-Cheng LinKai-Chi ChangChing-Hao Mao
    • G06F15/173
    • H04L61/1511H04L63/1408
    • A method for tracing at least one domain name is disclosed. In the method, several DNS resource records of candidate domain names are queried from at least one DNS name server. The candidate domain names are domain names that need to be traced. Internet Protocol (IP) addresses associated with the candidate domain names are retrieved from the DNS resource records of the candidate domain names. At least one external resource server is connected to retrieve corresponding registration information of the respective IP addresses of the candidate domain names. A tracing weight of each of the candidate domain names is calculated according to the DNS resource records, the IP addresses and the corresponding registration information of the candidate domain names. The candidate domain names are traced according to their respective tracing weights. A system for tracing at least one domain name is also disclosed.
    • 公开了一种追踪至少一个域名的方法。 在该方法中,从至少一个DNS名称服务器查询候选域名的若干DNS资源记录。 候选域名是需要追踪的域名。 从候选域名的DNS资源记录中检索与候选域名相关联的因特网协议(IP)地址。 连接至少一个外部资源服务器以检索候选域名的相应IP地址的对应注册信息。 根据DNS资源记录,IP地址和候选域名的相应注册信息计算每个候选域名的跟踪权重。 候选域名根据其各自的追踪权重进行跟踪。 还公开了用于追踪至少一个域名的系统。
    • 8. 发明申请
    • DETECTION METHODS AND DEVICES OF WEB MIMICRY ATTACKS
    • WEB MIMICRY攻击的检测方法和设备
    • US20110185420A1
    • 2011-07-28
    • US12820564
    • 2010-06-22
    • Hahn-Ming LEEEn-Sih LIOUJerome YEHChing-Hao MAO
    • Hahn-Ming LEEEn-Sih LIOUJerome YEHChing-Hao MAO
    • G06F11/00
    • H04L63/1416G06F21/31H04L63/168
    • A web mimicry attack detection device is provided, including: a first token sequence collector receiving a hypertext transfer protocol request and extracting string content of the hypertext transfer protocol request according to a token collection method to generate a token sequence corresponding to the hypertext transfer protocol request, wherein the token sequence comprises a plurality of the tokens; and a mimicry attack detector generating a label and a confidence score corresponding individually to the tokens according to the tokens and a conditional random field probability model, summing the confidence score individually corresponding to the tokens in the token sequence by a summary rule to generate a summary confidence score, and determining whether the hypertext transfer protocol request is an attack according to the summary confidence score and the label individually corresponding to the tokens.
    • 提供一种网络模拟攻击检测装置,包括:第一令牌序列收集器,接收超文本传输​​协议请求,并根据令牌收集方法提取超文本传输​​协议请求的字符串内容,以生成与超文本传输​​协议请求对应的令牌序列 ,其中所述令牌序列包括多个所述令牌; 以及模拟攻击检测器,其根据所述令牌和条件随机场概率模型,生成与所述令牌单独对应的标签和置信度分数,所述随机场概率模型通过总结规则将令牌序列中的所述令牌各自对应的置信度得分相加,以生成摘要 置信度得分,以及根据总结置信度得分和单独对应于令牌的标签来确定超文本传输​​协议请求是否是攻击。
    • 9. 发明授权
    • Network attack detection devices and methods
    • 网络攻击检测设备和方法
    • US08341742B2
    • 2012-12-25
    • US12837986
    • 2010-07-16
    • Hahn-Ming LeeSi-Yu HuangJerome YehChing-Hao Mao
    • Hahn-Ming LeeSi-Yu HuangJerome YehChing-Hao Mao
    • H04L29/06
    • H04L63/1416H04L29/12066H04L61/1511
    • A network attack detection device is provided, including a spatial coordinate database for storing spatial coordinate data; a standard time zone database for storing standard time zone data; a domain name system packet collector for collecting a domain name system packet; a spatial snapshot feature extractor for extracting internet protocol address corresponding to the domain name system packet according to the domain name system packet, and generating spatial feature data corresponding to the internet protocol address according to the internet protocol address, the spatial coordinate data and the standard time zone data; and an attack detector for determining whether the domain name system packet is an attack according to the spatial feature data and a spatial snapshot detection model, and when determining that the domain name system packet is an attack, sending a warning to indicate the attack.
    • 提供一种网络攻击检测装置,包括用于存储空间坐标数据的空间坐标数据库; 用于存储标准时区数据的标准时区数据库; 用于收集域名系统包的域名系统包收集器; 空间快照特征提取器,用于根据域名系统分组提取与域名系统分组对应的互联网协议地址,并根据因特网协议地址,空间坐标数据和标准产生与互联网协议地址对应的空间特征数据 时区数据; 以及用于根据空间特征数据和空间快照检测模型来确定域名系统分组是否是攻击的攻击检测器,并且当确定域名系统分组是攻击时,发送指示攻击的警告。
    • 10. 发明授权
    • Botnet early detection using hybrid hidden markov model algorithm
    • 僵尸网络早期检测使用混合隐马尔可夫模型算法
    • US08307459B2
    • 2012-11-06
    • US12726272
    • 2010-03-17
    • Hahn-Ming LeeChing-Hao MaoYu-Jie ChenYi-Hsun WangJerome YehTsu-Han Chen
    • Hahn-Ming LeeChing-Hao MaoYu-Jie ChenYi-Hsun WangJerome YehTsu-Han Chen
    • G06F7/04G06F11/00
    • H04L63/1441H04L2463/144
    • A botnet detection system is provided. A bursty feature extractor receives an Internet Relay Chat (IRC) packet value from a detection object network, and determines a bursty feature accordingly. A Hybrid Hidden Markov Model (HHMM) parameter estimator determines probability parameters for a Hybrid Hidden Markov Model according to the bursty feature. A traffic profile generator establishes a probability sequential model for the Hybrid Hidden Markov Model according to the probability parameters and pre-defined network traffic categories. A dubious state detector determines a traffic state corresponding to a network relaying the IRC packet in response to reception of a new IRC packet, determines whether the IRC packet flow of the object network is dubious by applying the bursty feature to the probability sequential model for the Hybrid Hidden Markov Model, and generates a warning signal when the IRC packet flow is regarded as having a dubious traffic state.
    • 提供僵尸网络检测系统。 突发特征提取器从检测对象网络接收因特网中继聊天(IRC)分组值,并相应地确定突发特征。 混合隐马尔可夫模型(HHMM)参数估计器根据突发特征确定混合隐马尔可夫模型的概率参数。 流量简档生成器根据概率参数和预定义的网络流量类别建立混合隐马尔可夫模型的概率序列模型。 可疑状态检测器响应于接收到新的IRC分组而确定与中继IRC分组的网络相对应的业务状态,通过将突发特征应用于概率序列模型来确定对象网络的IRC分组流是否可疑, 混合隐马尔可夫模型,并且当IRC分组流被认为具有可疑业务状态时,生成警告信号。