Patents by Inventor Dae Sung Moon

Dae Sung Moon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11997128
    Abstract: Collecting the topology and asset information of the virtual generated computer network, converting the topology and asset information into a training data set for training the neural network model, training the neural network model based on the training data set, and training A method and apparatus for predicting an attack vulnerability of a computer network through the step of inferring an attack vulnerability of a target computer network using a neural network model are provided.
    Type: Grant
    Filed: August 5, 2021
    Date of Patent: May 28, 2024
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Ki Jong Koo, Dae Sung Moon, Jooyoung Lee, Ik Kyun Kim, Kyungmin Park, Ho Hwang
  • Publication number: 20240163297
    Abstract: Disclosed herein are an artificial Intelligence (AI)-based cyber training method. The AI-based cyber training method may include generating a unit attack by training an attack agent based on environment and state information of a cyber range (CR) and a set of attack tools executable on a system, executing the unit attack in the CR, and then determining whether the unit attack has succeeded, and determining whether to perform an attack or a defense based on whether the unit attack has succeeded.
    Type: Application
    Filed: August 23, 2023
    Publication date: May 16, 2024
    Inventors: Jae-Hak YU, Ki-Jong KOO, Dae-Sung MOON, Ik-Kyun KIM
  • Publication number: 20240136267
    Abstract: A semiconductor package according to an embodiment includes a first insulating layer; and a first through electrode part passing through the first insulating layer and having a shape elongated in a first direction; wherein the first through electrode part includes a plurality of first through electrodes spaced apart from each other in a second direction perpendicular to the first direction and a thickness direction; wherein at least one of the plurality of first through electrodes includes a first sub through electrode and a second sub through electrode spaced apart from each other in the first direction; and wherein at least one of the first sub through electrode and the second sub through electrode has a width in the first direction greater than a width in the second direction.
    Type: Application
    Filed: February 17, 2022
    Publication date: April 25, 2024
    Applicant: LG INNOTEK CO., LTD.
    Inventors: Hyun Sun LEE, Dae Sung MOON, Dong Hun JOUNG
  • Publication number: 20240104195
    Abstract: Disclosed herein are an apparatus and method for updating an Internet-based malware detection engine using virtual machine scaling. The method may include creating a scaling group and an update group set based on a first virtual machine image, creating a second virtual machine image for a running virtual machine in response to occurrence of a snapshot event in the virtual update group run based on the first virtual machine image, modifying the scale-out image of the scaling group to the second virtual machine image, updating the scaling group by triggering a scale-out event and a scale-in event in the scaling group in response to occurrence of an update event, and modifying the scale-in image of the scaling group to the second virtual machine image.
    Type: Application
    Filed: June 15, 2023
    Publication date: March 28, 2024
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Sang-Min LEE, Ki-Jong KOO, Jung-Tae KIM, Ji-Hyeon SONG, Jong-Hyun KIM, Dae-Sung MOON
  • Patent number: 11790085
    Abstract: Disclosed herein are an apparatus for detecting unknown malware using a variable-length operation code (opcode) and a method using the apparatus. The method includes collecting opcode information from a detection target, generating a multi-pixel image having a variable length by performing feature engineering on the opcode information; and detecting unknown malware by inputting the multi-pixel image to a deep-learning model based on AI.
    Type: Grant
    Filed: August 30, 2021
    Date of Patent: October 17, 2023
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jung-Tae Kim, Ji-Hyeon Song, Jong-Hyun Kim, Sang-Min Lee, Ik-Kyun Kim, Dae-Sung Moon
  • Publication number: 20230047450
    Abstract: Disclosed herein are an apparatus and method for inferring a cyberattack path based on attention. The apparatus includes memory in which at least one program is recorded and a processor for executing the program. The program generates test data required for generating an intelligent attack graph and generates an attack graph based on an intelligent attack path prediction model.
    Type: Application
    Filed: August 5, 2022
    Publication date: February 16, 2023
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Ki-Jong KOO, Dae-Sung MOON, Joo-Young LEE, Ik-Kyun KIM, Kyung-Min PARK
  • Publication number: 20220188339
    Abstract: Disclosed herein are a network environment synchronization apparatus and method. The network environment synchronization apparatus includes one or more processors, and execution memory for storing at least one program that is executed by the one or more processors, wherein the at least one program is configured to collect data from a network environment and generate a management structure in which collected data is distributed into preset respective group units, generate data discriminators for respective group units using a preset hash function, determine whether data of the management structure has changed with reference to data newly collected from the network environment based on the data discriminators, and when it is determined whether data of the management structure has changed, update the data of the management structure with the newly collected data.
    Type: Application
    Filed: December 15, 2021
    Publication date: June 16, 2022
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Joo-Young LEE, Ki-Jong KOO, Ik-Kyun KIM, Dae-Sung MOON, Kyung-Min PARK
  • Publication number: 20220138319
    Abstract: Disclosed herein are an apparatus for detecting unknown malware using a variable-length operation code (opcode) and a method using the apparatus. The method includes collecting opcode information from a detection target, generating a multi-pixel image having a variable length by performing feature engineering on the opcode information; and detecting unknown malware by inputting the multi-pixel image to a deep-learning model based on AI.
    Type: Application
    Filed: August 30, 2021
    Publication date: May 5, 2022
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Jung-Tae KIM, Ji-Hyeon SONG, Jong-Hyun KIM, Sang-Min LEE, Ik-Kyun KIM, Dae-Sung MOON
  • Publication number: 20220046048
    Abstract: Collecting the topology and asset information of the virtual generated computer network, converting the topology and asset information into a training data set for training the neural network model, training the neural network model based on the training data set, and training A method and apparatus for predicting an attack vulnerability of a computer network through the step of inferring an attack vulnerability of a target computer network using a neural network model are provided.
    Type: Application
    Filed: August 5, 2021
    Publication date: February 10, 2022
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Ki Jong KOO, Dae Sung MOON, Jooyoung LEE, Ik Kyun KIM, Kyungmin PARK, Ho HWANG
  • Patent number: 11171915
    Abstract: Disclosed herein are a server apparatus, a client apparatus, and a method for communication based on network address mutation. The method for communication based on network address mutation, performed by the server apparatus and the client apparatus, includes setting the external address of a network interface for receiving a packet from the client apparatus; setting the internal address of a hidden interface in order to forward the packet received through the network interface to the hidden interface; modifying the external address based on a preset network address mutation rule; and communicating with the client apparatus by forwarding the packet, received from the client apparatus based on the modified external address, to the hidden interface.
    Type: Grant
    Filed: June 26, 2019
    Date of Patent: November 9, 2021
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Kyung-Min Park, Samuel Woo, Dae-Sung Moon, Ki-Jong Koo, Ik-Kyun Kim, Joo-Young Lee
  • Publication number: 20210056234
    Abstract: Disclosed herein is a method of operating a data management apparatus. The method may include segmenting, by a client device, data into multiple data blocks, generating, by the client device, tags corresponding to the multiple data blocks, generating, by the client device, a representative value by accumulating the tags, generating, by the client device, a client signature value by signing the representative value and a counter value corresponding to the last updated data block, among the multiple data blocks, and transmitting, by the client device, the data and the client signature value to a server.
    Type: Application
    Filed: August 7, 2020
    Publication date: February 25, 2021
    Inventors: Taek-Young YOUN, Nam-Su JHO, Dae-Sung MOON, Ik-Kyun KIM, Seung-Hun JIN
  • Patent number: 10902144
    Abstract: In the present invention, by providing an apparatus for securing data comprising a memory for storing information for data processing, a processor configured to partition original data into a plurality of partial data and generate a plurality of divided data by randomly determining positions of each of the plurality of partial data within the original data, and a communication interface configured to transmit each of the plurality of divided data to each of a plurality of servers, respectively, if an attacker obtains a portion of the divided data, it prevents the entire original data from being restored, and the legitimate user can restore the original data accurately even if some divided data is corrupted, and provides an efficient data polymorphic dividing technique that can minimize the amount of calculation required to secure data.
    Type: Grant
    Filed: August 27, 2018
    Date of Patent: January 26, 2021
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Nam-Su Jho, Taek-Young Youn, Dae Sung Moon, Ik Kyun Kim, Seung Hun Jin
  • Publication number: 20200310652
    Abstract: A method for secure distributed data management for dynamic data includes segmenting original data into multiple pieces, generating state information pertaining to row-based data configured with data blocks, and generating additional information for recovering the state information and the row-based data. The data blocks, corresponding to the segmented data, are stored in data servers, and each of the data servers stores data blocks selected at an interval corresponding to the number of data servers in order to store the segmented data.
    Type: Application
    Filed: February 19, 2020
    Publication date: October 1, 2020
    Inventors: Taek-Young YOUN, Nam-Su JHO, Dae-Sung MOON, Ik-Kyun KIM, Seung-Hun JIN
  • Patent number: 10785252
    Abstract: Disclosed herein is an apparatus for enhancing network security, which includes an information collection unit for collecting information about states of hosts that form a network and information about connectivity in the network; an attack surface analysis unit for analyzing attack surfaces by creating an attack graph using the information about the states and the information about connectivity; a security-enhancing strategy establishment unit for establishing a security-enhancing strategy based on the attack graph; and a security-enhancing strategy implementation unit for delivering a measure based on the security-enhancing strategy to a corresponding host, thereby taking a security-enhancing measure.
    Type: Grant
    Filed: May 21, 2018
    Date of Patent: September 22, 2020
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jooyoung Lee, Dae-Sung Moon, Kyung-Min Park, Samuel Woo, Ho Hwang, Ik-Kyun Kim, Seung-Hun Jin
  • Publication number: 20200153861
    Abstract: Disclosed herein are a decoy apparatus and a method for expanding a fake attack surface using a deception network. The method includes determining, by a protected server, whether a packet is a target to be processed when the packet is received; converting, by the protected server, the packet and transmitting, by the protected server, the converted packet to the decoy apparatus of the deception network when the packet is determined not to be such a target; receiving, by the protected server, a response packet from a decoy virtual machine included in the decoy apparatus as a reply to the converted packet; and modifying, by the protected server, the response packet and transmitting, by the protected server, the modified response packet to the source from which the packet was transmitted, in order to expand the fake attack surface.
    Type: Application
    Filed: November 11, 2019
    Publication date: May 14, 2020
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Kyung-Min PARK, Dae-Sung MOON, Ki-Jong KOO, Ik-Kyun KIM, Samuel WOO, Joo-Young LEE
  • Publication number: 20200099704
    Abstract: Disclosed are a method and apparatus for searching for an attack path. The apparatus generates an attack graph, generates an attack graph ontology, generates a semantic attack graph by imparting semantics to the attack graph on the basis of the attack graph ontology, and searches for the attack path on the basis of the semantic attack graph.
    Type: Application
    Filed: September 23, 2019
    Publication date: March 26, 2020
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Joo Young LEE, Ki Jong KOO, Ik Kyun KIM, Dae Sung MOON, Kyung Min PARK, Samuel WOO, Ho HWANG
  • Publication number: 20200007496
    Abstract: Disclosed herein are a server apparatus, a client apparatus, and a method for communication based on network address mutation. The method for communication based on network address mutation, performed by the server apparatus and the client apparatus, includes setting the external address of a network interface for receiving a packet from the client apparatus; setting the internal address of a hidden interface in order to forward the packet received through the network interface to the hidden interface; modifying the external address based on a preset network address mutation rule; and communicating with the client apparatus by forwarding the packet, received from the client apparatus based on the modified external address, to the hidden interface.
    Type: Application
    Filed: June 26, 2019
    Publication date: January 2, 2020
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Kyung-Min PARK, Samuel WOO, Dae-Sung MOON, Ki-Jong KOO, Ik-Kyun KIM, Joo-Young LEE
  • Patent number: 10404782
    Abstract: Disclosed are an apparatus and method for reconstructing a transmitted file with high performance in real time, which select analysis target packets for reconstruction by first checking using hardware whether data file-related information is present in packets transmitted via large-capacity traffic over a broadband network, and which reconstruct a file in real time only from the selected analysis target packets. The file reconstruction apparatus for reconstructing a data file from packets on a network includes a packet monitoring unit for extracting packets on the network, a collected packet selection unit for determining whether, for the extracted packets, each packet is a reconstruction target based on flow information, and selecting a reconstruction target packet, and a file reconstruction unit for performing file reconstruction by extracting data from the reconstruction target packet and by storing the extracted data as data of a reconstructed file in a relevant flow.
    Type: Grant
    Filed: October 21, 2016
    Date of Patent: September 3, 2019
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Yang-Seo Choi, Jong-Hyun Kim, Joo-Young Lee, Sun-Oh Choi, Ik-Kyun Kim, Dae-Sung Moon
  • Publication number: 20190065776
    Abstract: In the present invention, by providing an apparatus for securing data comprising a memory for storing information for data processing, a processor configured to partition original data into a plurality of partial data and generate a plurality of divided data by randomly determining positions of each of the plurality of partial data within the original data, and a communication interface configured to transmit each of the plurality of divided data to each of a plurality of servers, respectively, if an attacker obtains a portion of the divided data, it prevents the entire original data from being restored, and the legitimate user can restore the original data accurately even if some divided data is corrupted, and provides an efficient data polymorphic dividing technique that can minimize the amount of calculation required to secure data.
    Type: Application
    Filed: August 27, 2018
    Publication date: February 28, 2019
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Nam-Su JHO, Taek-Young YOUN, Dae Sung MOON, Ik Kyun KIM, Seung Hun JIN
  • Publication number: 20190052663
    Abstract: Disclosed herein is an apparatus for enhancing network security, which includes an information collection unit for collecting information about states of hosts that form a network and information about connectivity in the network; an attack surface analysis unit for analyzing attack surfaces by creating an attack graph using the information about the states and the information about connectivity; a security-enhancing strategy establishment unit for establishing a security-enhancing strategy based on the attack graph; and a security-enhancing strategy implementation unit for delivering a measure based on the security-enhancing strategy to a corresponding host, thereby taking a security-enhancing measure.
    Type: Application
    Filed: May 21, 2018
    Publication date: February 14, 2019
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Jooyoung LEE, Dae-Sung MOON, Kyung-Min PARK, Samuel WOO, Ho HWANG, Ik-Kyun KIM, Seung-Hun JIN