Patents by Inventor Dae Sung Moon
Dae Sung Moon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11997128Abstract: Collecting the topology and asset information of the virtual generated computer network, converting the topology and asset information into a training data set for training the neural network model, training the neural network model based on the training data set, and training A method and apparatus for predicting an attack vulnerability of a computer network through the step of inferring an attack vulnerability of a target computer network using a neural network model are provided.Type: GrantFiled: August 5, 2021Date of Patent: May 28, 2024Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Ki Jong Koo, Dae Sung Moon, Jooyoung Lee, Ik Kyun Kim, Kyungmin Park, Ho Hwang
-
Publication number: 20240163297Abstract: Disclosed herein are an artificial Intelligence (AI)-based cyber training method. The AI-based cyber training method may include generating a unit attack by training an attack agent based on environment and state information of a cyber range (CR) and a set of attack tools executable on a system, executing the unit attack in the CR, and then determining whether the unit attack has succeeded, and determining whether to perform an attack or a defense based on whether the unit attack has succeeded.Type: ApplicationFiled: August 23, 2023Publication date: May 16, 2024Inventors: Jae-Hak YU, Ki-Jong KOO, Dae-Sung MOON, Ik-Kyun KIM
-
Publication number: 20240136267Abstract: A semiconductor package according to an embodiment includes a first insulating layer; and a first through electrode part passing through the first insulating layer and having a shape elongated in a first direction; wherein the first through electrode part includes a plurality of first through electrodes spaced apart from each other in a second direction perpendicular to the first direction and a thickness direction; wherein at least one of the plurality of first through electrodes includes a first sub through electrode and a second sub through electrode spaced apart from each other in the first direction; and wherein at least one of the first sub through electrode and the second sub through electrode has a width in the first direction greater than a width in the second direction.Type: ApplicationFiled: February 17, 2022Publication date: April 25, 2024Applicant: LG INNOTEK CO., LTD.Inventors: Hyun Sun LEE, Dae Sung MOON, Dong Hun JOUNG
-
Publication number: 20240104195Abstract: Disclosed herein are an apparatus and method for updating an Internet-based malware detection engine using virtual machine scaling. The method may include creating a scaling group and an update group set based on a first virtual machine image, creating a second virtual machine image for a running virtual machine in response to occurrence of a snapshot event in the virtual update group run based on the first virtual machine image, modifying the scale-out image of the scaling group to the second virtual machine image, updating the scaling group by triggering a scale-out event and a scale-in event in the scaling group in response to occurrence of an update event, and modifying the scale-in image of the scaling group to the second virtual machine image.Type: ApplicationFiled: June 15, 2023Publication date: March 28, 2024Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Sang-Min LEE, Ki-Jong KOO, Jung-Tae KIM, Ji-Hyeon SONG, Jong-Hyun KIM, Dae-Sung MOON
-
Patent number: 11790085Abstract: Disclosed herein are an apparatus for detecting unknown malware using a variable-length operation code (opcode) and a method using the apparatus. The method includes collecting opcode information from a detection target, generating a multi-pixel image having a variable length by performing feature engineering on the opcode information; and detecting unknown malware by inputting the multi-pixel image to a deep-learning model based on AI.Type: GrantFiled: August 30, 2021Date of Patent: October 17, 2023Assignee: Electronics and Telecommunications Research InstituteInventors: Jung-Tae Kim, Ji-Hyeon Song, Jong-Hyun Kim, Sang-Min Lee, Ik-Kyun Kim, Dae-Sung Moon
-
Publication number: 20230047450Abstract: Disclosed herein are an apparatus and method for inferring a cyberattack path based on attention. The apparatus includes memory in which at least one program is recorded and a processor for executing the program. The program generates test data required for generating an intelligent attack graph and generates an attack graph based on an intelligent attack path prediction model.Type: ApplicationFiled: August 5, 2022Publication date: February 16, 2023Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Ki-Jong KOO, Dae-Sung MOON, Joo-Young LEE, Ik-Kyun KIM, Kyung-Min PARK
-
Publication number: 20220188339Abstract: Disclosed herein are a network environment synchronization apparatus and method. The network environment synchronization apparatus includes one or more processors, and execution memory for storing at least one program that is executed by the one or more processors, wherein the at least one program is configured to collect data from a network environment and generate a management structure in which collected data is distributed into preset respective group units, generate data discriminators for respective group units using a preset hash function, determine whether data of the management structure has changed with reference to data newly collected from the network environment based on the data discriminators, and when it is determined whether data of the management structure has changed, update the data of the management structure with the newly collected data.Type: ApplicationFiled: December 15, 2021Publication date: June 16, 2022Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Joo-Young LEE, Ki-Jong KOO, Ik-Kyun KIM, Dae-Sung MOON, Kyung-Min PARK
-
Publication number: 20220138319Abstract: Disclosed herein are an apparatus for detecting unknown malware using a variable-length operation code (opcode) and a method using the apparatus. The method includes collecting opcode information from a detection target, generating a multi-pixel image having a variable length by performing feature engineering on the opcode information; and detecting unknown malware by inputting the multi-pixel image to a deep-learning model based on AI.Type: ApplicationFiled: August 30, 2021Publication date: May 5, 2022Applicant: Electronics and Telecommunications Research InstituteInventors: Jung-Tae KIM, Ji-Hyeon SONG, Jong-Hyun KIM, Sang-Min LEE, Ik-Kyun KIM, Dae-Sung MOON
-
Publication number: 20220046048Abstract: Collecting the topology and asset information of the virtual generated computer network, converting the topology and asset information into a training data set for training the neural network model, training the neural network model based on the training data set, and training A method and apparatus for predicting an attack vulnerability of a computer network through the step of inferring an attack vulnerability of a target computer network using a neural network model are provided.Type: ApplicationFiled: August 5, 2021Publication date: February 10, 2022Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Ki Jong KOO, Dae Sung MOON, Jooyoung LEE, Ik Kyun KIM, Kyungmin PARK, Ho HWANG
-
Patent number: 11171915Abstract: Disclosed herein are a server apparatus, a client apparatus, and a method for communication based on network address mutation. The method for communication based on network address mutation, performed by the server apparatus and the client apparatus, includes setting the external address of a network interface for receiving a packet from the client apparatus; setting the internal address of a hidden interface in order to forward the packet received through the network interface to the hidden interface; modifying the external address based on a preset network address mutation rule; and communicating with the client apparatus by forwarding the packet, received from the client apparatus based on the modified external address, to the hidden interface.Type: GrantFiled: June 26, 2019Date of Patent: November 9, 2021Assignee: Electronics and Telecommunications Research InstituteInventors: Kyung-Min Park, Samuel Woo, Dae-Sung Moon, Ki-Jong Koo, Ik-Kyun Kim, Joo-Young Lee
-
Publication number: 20210056234Abstract: Disclosed herein is a method of operating a data management apparatus. The method may include segmenting, by a client device, data into multiple data blocks, generating, by the client device, tags corresponding to the multiple data blocks, generating, by the client device, a representative value by accumulating the tags, generating, by the client device, a client signature value by signing the representative value and a counter value corresponding to the last updated data block, among the multiple data blocks, and transmitting, by the client device, the data and the client signature value to a server.Type: ApplicationFiled: August 7, 2020Publication date: February 25, 2021Inventors: Taek-Young YOUN, Nam-Su JHO, Dae-Sung MOON, Ik-Kyun KIM, Seung-Hun JIN
-
Patent number: 10902144Abstract: In the present invention, by providing an apparatus for securing data comprising a memory for storing information for data processing, a processor configured to partition original data into a plurality of partial data and generate a plurality of divided data by randomly determining positions of each of the plurality of partial data within the original data, and a communication interface configured to transmit each of the plurality of divided data to each of a plurality of servers, respectively, if an attacker obtains a portion of the divided data, it prevents the entire original data from being restored, and the legitimate user can restore the original data accurately even if some divided data is corrupted, and provides an efficient data polymorphic dividing technique that can minimize the amount of calculation required to secure data.Type: GrantFiled: August 27, 2018Date of Patent: January 26, 2021Assignee: Electronics and Telecommunications Research InstituteInventors: Nam-Su Jho, Taek-Young Youn, Dae Sung Moon, Ik Kyun Kim, Seung Hun Jin
-
Publication number: 20200310652Abstract: A method for secure distributed data management for dynamic data includes segmenting original data into multiple pieces, generating state information pertaining to row-based data configured with data blocks, and generating additional information for recovering the state information and the row-based data. The data blocks, corresponding to the segmented data, are stored in data servers, and each of the data servers stores data blocks selected at an interval corresponding to the number of data servers in order to store the segmented data.Type: ApplicationFiled: February 19, 2020Publication date: October 1, 2020Inventors: Taek-Young YOUN, Nam-Su JHO, Dae-Sung MOON, Ik-Kyun KIM, Seung-Hun JIN
-
Patent number: 10785252Abstract: Disclosed herein is an apparatus for enhancing network security, which includes an information collection unit for collecting information about states of hosts that form a network and information about connectivity in the network; an attack surface analysis unit for analyzing attack surfaces by creating an attack graph using the information about the states and the information about connectivity; a security-enhancing strategy establishment unit for establishing a security-enhancing strategy based on the attack graph; and a security-enhancing strategy implementation unit for delivering a measure based on the security-enhancing strategy to a corresponding host, thereby taking a security-enhancing measure.Type: GrantFiled: May 21, 2018Date of Patent: September 22, 2020Assignee: Electronics and Telecommunications Research InstituteInventors: Jooyoung Lee, Dae-Sung Moon, Kyung-Min Park, Samuel Woo, Ho Hwang, Ik-Kyun Kim, Seung-Hun Jin
-
Publication number: 20200153861Abstract: Disclosed herein are a decoy apparatus and a method for expanding a fake attack surface using a deception network. The method includes determining, by a protected server, whether a packet is a target to be processed when the packet is received; converting, by the protected server, the packet and transmitting, by the protected server, the converted packet to the decoy apparatus of the deception network when the packet is determined not to be such a target; receiving, by the protected server, a response packet from a decoy virtual machine included in the decoy apparatus as a reply to the converted packet; and modifying, by the protected server, the response packet and transmitting, by the protected server, the modified response packet to the source from which the packet was transmitted, in order to expand the fake attack surface.Type: ApplicationFiled: November 11, 2019Publication date: May 14, 2020Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Kyung-Min PARK, Dae-Sung MOON, Ki-Jong KOO, Ik-Kyun KIM, Samuel WOO, Joo-Young LEE
-
Publication number: 20200099704Abstract: Disclosed are a method and apparatus for searching for an attack path. The apparatus generates an attack graph, generates an attack graph ontology, generates a semantic attack graph by imparting semantics to the attack graph on the basis of the attack graph ontology, and searches for the attack path on the basis of the semantic attack graph.Type: ApplicationFiled: September 23, 2019Publication date: March 26, 2020Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Joo Young LEE, Ki Jong KOO, Ik Kyun KIM, Dae Sung MOON, Kyung Min PARK, Samuel WOO, Ho HWANG
-
Publication number: 20200007496Abstract: Disclosed herein are a server apparatus, a client apparatus, and a method for communication based on network address mutation. The method for communication based on network address mutation, performed by the server apparatus and the client apparatus, includes setting the external address of a network interface for receiving a packet from the client apparatus; setting the internal address of a hidden interface in order to forward the packet received through the network interface to the hidden interface; modifying the external address based on a preset network address mutation rule; and communicating with the client apparatus by forwarding the packet, received from the client apparatus based on the modified external address, to the hidden interface.Type: ApplicationFiled: June 26, 2019Publication date: January 2, 2020Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Kyung-Min PARK, Samuel WOO, Dae-Sung MOON, Ki-Jong KOO, Ik-Kyun KIM, Joo-Young LEE
-
Patent number: 10404782Abstract: Disclosed are an apparatus and method for reconstructing a transmitted file with high performance in real time, which select analysis target packets for reconstruction by first checking using hardware whether data file-related information is present in packets transmitted via large-capacity traffic over a broadband network, and which reconstruct a file in real time only from the selected analysis target packets. The file reconstruction apparatus for reconstructing a data file from packets on a network includes a packet monitoring unit for extracting packets on the network, a collected packet selection unit for determining whether, for the extracted packets, each packet is a reconstruction target based on flow information, and selecting a reconstruction target packet, and a file reconstruction unit for performing file reconstruction by extracting data from the reconstruction target packet and by storing the extracted data as data of a reconstructed file in a relevant flow.Type: GrantFiled: October 21, 2016Date of Patent: September 3, 2019Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Yang-Seo Choi, Jong-Hyun Kim, Joo-Young Lee, Sun-Oh Choi, Ik-Kyun Kim, Dae-Sung Moon
-
Publication number: 20190065776Abstract: In the present invention, by providing an apparatus for securing data comprising a memory for storing information for data processing, a processor configured to partition original data into a plurality of partial data and generate a plurality of divided data by randomly determining positions of each of the plurality of partial data within the original data, and a communication interface configured to transmit each of the plurality of divided data to each of a plurality of servers, respectively, if an attacker obtains a portion of the divided data, it prevents the entire original data from being restored, and the legitimate user can restore the original data accurately even if some divided data is corrupted, and provides an efficient data polymorphic dividing technique that can minimize the amount of calculation required to secure data.Type: ApplicationFiled: August 27, 2018Publication date: February 28, 2019Applicant: Electronics and Telecommunications Research InstituteInventors: Nam-Su JHO, Taek-Young YOUN, Dae Sung MOON, Ik Kyun KIM, Seung Hun JIN
-
Publication number: 20190052663Abstract: Disclosed herein is an apparatus for enhancing network security, which includes an information collection unit for collecting information about states of hosts that form a network and information about connectivity in the network; an attack surface analysis unit for analyzing attack surfaces by creating an attack graph using the information about the states and the information about connectivity; a security-enhancing strategy establishment unit for establishing a security-enhancing strategy based on the attack graph; and a security-enhancing strategy implementation unit for delivering a measure based on the security-enhancing strategy to a corresponding host, thereby taking a security-enhancing measure.Type: ApplicationFiled: May 21, 2018Publication date: February 14, 2019Applicant: Electronics and Telecommunications Research InstituteInventors: Jooyoung LEE, Dae-Sung MOON, Kyung-Min PARK, Samuel WOO, Ho HWANG, Ik-Kyun KIM, Seung-Hun JIN