Patents Assigned to Korea Internet & Security Agency
  • Patent number: 12124573
    Abstract: An event processing method performed by a computing device is provided. The method may comprise receiving a plurality of events and generating a first event sequence in which the received events are sequentially arranged, determining first priorities for the events included in the first event sequence, using data output from a previously trained priority decision model, verifying the first priorities by comparing the first priorities with second priorities for the events included in the first event sequence, determining a feedback score for the first priorities based on results of the verification; and reinforcing the training of the priority decision model using the feedback score.
    Type: Grant
    Filed: January 24, 2024
    Date of Patent: October 22, 2024
    Assignee: KOREA INTERNET & SECURITY AGENCY
    Inventors: Joon Hyung Lim, Tae Eun Kim, Ki Jong Son, Sae Woom Lee, Seul Ki Choi, Tae Hyeon Kim
  • Patent number: 12107899
    Abstract: The method for automatically generating a playbook performed by a computing apparatus according to the present disclosure comprises periodically collecting asset information and CTI (Cyber Threat Intelligence) information of a target network, extracting TTP (Tactics, Techniques, Procedure) information using the collected asset information and the collected CTI information, retrieving a data source of the extracted TTP information, generating a temporary playbook including a data component matching a detection method of the extracted TTP information among a plurality of data components of the retrieved data source, verifying validity of the temporary playbook based on data component order information of the temporary playbook and determining whether rearrangement of data components included in the temporary playbook is needed, and rearranging data components included in the temporary playbook, and storing it as a final playbook.
    Type: Grant
    Filed: January 23, 2024
    Date of Patent: October 1, 2024
    Assignee: KOREA INTERNET & SECURITY AGENCY
    Inventors: Joon Hyung Lim, Tae Eun Kim, Ki Jong Son, Sae Woom Lee, Seul Ki Choi, Tae Hyeon Kim
  • Publication number: 20240289454
    Abstract: An apparatus for collecting meta data related to malicious code meta information, includes: an application programming interface (API) key setting unit configured to register as a member of a collection channel related to malicious code of cyber attacks, and set the API key as an initialization input; a collection channel access unit configured to, upon input of the set API key, access the collection channel; an execution command interpretation unit configured to, subsequent to accessing the collection channel, upon input of an execution command, interpret the input execution command; and a meta information management unit configured to, based on API information provided from the collection channel according to the interpreted execution command, extract at least one piece of meta information for identifying an attack group, and manage the at least one piece of meta information in a JSON format for each attack group.
    Type: Application
    Filed: February 12, 2024
    Publication date: August 29, 2024
    Applicant: Korea Internet & Security Agency
    Inventors: Jae Han JEONG, Chan Woong HWANG, Jae Gyu JEON, Woong GO
  • Publication number: 20240154990
    Abstract: A device for automatically sorting a cyber attack includes an event feature generator that extracts a unique attacker IP by analyzing attacker IPs for each of the different kinds of security devices, and generates AI learning features of the security events of the different kinds of security devices including feature numerical data quantifying at least two or more features through attack information analysis recorded in the different kinds of security devices based on the information on the security events of the different kinds of security devices mapped to the extracted unique attacker IP, and an attack type sorter that learns the generated feature numerical data using an unsupervised learning algorithm, generates clustering data by sorting the feature numerical data into similar attack data and clustering sorted feature numerical data, and then analyzes the generated clustering data to identify a short-term or long-term attacker's cyber attack type.
    Type: Application
    Filed: October 31, 2023
    Publication date: May 9, 2024
    Applicant: Korea Internet & Security Agency
    Inventors: Do Won KIM, Tae Eun KIM, Ki Jong SON, Sae Woom LEE, Seul Ki CHOI, Tae Hyeon KIM, Gyeong Jin NA
  • Publication number: 20240152604
    Abstract: Disclosed are a system and method for automatically generating a playbook and verifying validity of a playbook based on artificial intelligence, wherein the system present invention includes a system for automatically generating a playbook that automatically generates the playbook, and a system for verifying validity of a playbook that is connected to the system for automatically generating a playbook through a network to perform the verification of the validity on the playbook received from the system for automatically generating a playbook.
    Type: Application
    Filed: October 31, 2023
    Publication date: May 9, 2024
    Applicant: Korea Internet & Security Agency
    Inventors: Do Won KIM, Tae Eun KIM, Ki Jong SON, Sae Woom LEE, Seul Ki CHOI, Tae Hyeon KIM, Gyeong Jin NA
  • Publication number: 20240152608
    Abstract: A method of supporting decision-making of security control includes: (a) when an system for automatically analyzing a security threat receives a security warning from a security device, collecting security threat events generating the security warning from the security device; (b) when the collected security threat events exceed a preset event processing threshold, generating, by the system for automatically analyzing a security threat, a first request message for preferentially processing a security event; (c) when receiving the first request message generated from the system, determining, by the system for supporting priority of security control, a priority processing order of the security threat events, and notifying the system; and (d) when receiving the second request message generated from the system, determining, by the system for supporting priority of security control, a priority processing order and notifying the system for automatically analyzing a security threat of the determined priority process
    Type: Application
    Filed: October 31, 2023
    Publication date: May 9, 2024
    Applicant: Korea Internet & Security Agency
    Inventors: Do Won KIM, Tae Eun KIM, Ki Jong SON, Sae Woom LEE, Seul Ki CHOI, Tae Hyeon KIM, Gyeong Jin NA
  • Patent number: 11842336
    Abstract: A method for identifying a wallet address associated with a virtual asset service provider is provided. The method comprises receiving a target wallet address, obtaining a transaction of a virtual asset associated with the target wallet address, obtaining a list of a plurality of known wallet addresses of virtual asset service providers (VASPs) and identifying a type of the target wallet address, by performing at least one of a cold wallet determination routine and a hot wallet determination routine for the target wallet address, based on the transaction and the list of known wallet addresses of the VASPs.
    Type: Grant
    Filed: August 5, 2022
    Date of Patent: December 12, 2023
    Assignees: KOREA INTERNET & SECURITY AGENCY, Lambda256, CO., LTD
    Inventors: Yong Hee Shin, Moon Hee Cho, Kyeong Han Kim, Dae Il Jang, Seung Goo Ji, Jae Hoon Oh
  • Patent number: 11797617
    Abstract: A method for collecting dark web information is provided. The method for collecting dark web information is performed by a computing device and comprises obtaining a list of onion addresses of a plurality of target dark web sites, accessing at least one of the plurality of target dark web sites, collecting web page information of the accessed dark web site, storing information on the accessed dark web site by analyzing the collected web page information and providing an analysis result of the accessed dark web site by using the stored information on the accessed dark web site.
    Type: Grant
    Filed: April 12, 2022
    Date of Patent: October 24, 2023
    Assignee: KOREA INTERNET & SECURITY AGENCY
    Inventors: Kyeong Han Kim, Moon Hee Cho, Yong Hee Shin
  • Publication number: 20230171272
    Abstract: Disclosed are a system and a method for detecting session initiation protocol (SIP) noncoding, and more particularly, to a system and a method for detecting SIP noncoding, which can manage reputation of a client terminal according to whether or not the client terminal sends an encoded SIP message through a 5G non-standalone/Standalone (5G NSA/SA), thereby preventing an SIP spoofing attack.
    Type: Application
    Filed: June 27, 2022
    Publication date: June 1, 2023
    Applicant: Korea Internet & Security Agency
    Inventors: Do Won KIM, Seong Min PARK, Hyung Jin CHO, Young Kwon PARK, Dae Un KIM, Sung Moon KWON
  • Publication number: 20230156043
    Abstract: Disclosed is a system and a method of supporting a decision-making for security management to cause a security controller to rapidly take precautions against a threat, the system comprising: an interface unit configured to receive a request for support of a decision-making, and a processing unit configured to support at least one decision-making concerning materialization of the threat, the selection of a security event to be preferentially processed, or the recommendation of a most suitable response according to the request for the support of the decision-making.
    Type: Application
    Filed: October 25, 2022
    Publication date: May 18, 2023
    Applicant: Korea Internet & Security Agency
    Inventors: Do Won KIM, Tae Eun KIM, Ki Jong SON, Seul Ki CHOI, Jong Ki KIM
  • Publication number: 20230156026
    Abstract: Disclosed is a system and a method of automatizing a threat analysis based on artificial intelligence according to the present invention, the system comprising: a playbook automatic-generation module configured to generate a playbook based on a template by utilizing an artificial learning model; a playbook verification and management module configured to verify effectiveness of the playbook generated by the playbook automatic-generation module; a playbook database configured to save the playbook verified by the playbook verification and management module; and a playbook execution module configured to automatically execute any playbook corresponding to a detected event through matching therebetween from the playbook database.
    Type: Application
    Filed: October 25, 2022
    Publication date: May 18, 2023
    Applicant: Korea Internet & Security Agency
    Inventors: Do Won KIM, Tae Eun KIM, Ki Jong SON, Seul Ki CHOI, Jong Ki KIM
  • Publication number: 20230146636
    Abstract: Disclosed is a system and a method of detecting an abnormal act threatening to security based on artificial intelligence according to the present invention, and, more particularly, a system and a method of detecting an abnormal act threatening to security based on artificial intelligence that are capable of rapidly carrying out pre-processing of a large-scaled data set based on multi processing, and efficiently detecting the abnormal act threatening to security via various pieces of security device on the basis of studied artificial intelligence.
    Type: Application
    Filed: October 25, 2022
    Publication date: May 11, 2023
    Applicant: Korea Internet & Security Agency
    Inventors: Do Won KIM, Tae Eun KIM, Ki Jong SON, Seul Ki CHOI, Jong Ki KIM
  • Publication number: 20220383298
    Abstract: A method for identifying a wallet address associated with a virtual asset service provider is provided. The method comprises receiving a target wallet address, obtaining a transaction of a virtual asset associated with the target wallet address, obtaining a list of a plurality of known wallet addresses of virtual asset service providers (VASPs) and identifying a type of the target wallet address, by performing at least one of a cold wallet determination routine and a hot wallet determination routine for the target wallet address, based on the transaction and the list of known wallet addresses of the VASPs.
    Type: Application
    Filed: August 5, 2022
    Publication date: December 1, 2022
    Applicants: KOREA INTERNET & SECURITY AGENCY, Lambda256, CO., LTD
    Inventors: Yong Hee SHIN, Moon Hee CHO, Kyeong Han KIM, Dae Il JANG, Seung Goo JI, Jae Hoon OH
  • Patent number: 11443304
    Abstract: A method for identifying a wallet address associated with a virtual asset service provider is provided. The method comprises receiving a target wallet address, obtaining a transaction of a virtual asset associated with the target wallet address, obtaining a list of a plurality of known wallet addresses of virtual asset service providers (VASPs) and identifying a type of the target wallet address, by performing at least one of a cold wallet determination routine and a hot wallet determination routine for the target wallet address, based on the transaction and the list of known wallet addresses of the VASPs.
    Type: Grant
    Filed: October 15, 2021
    Date of Patent: September 13, 2022
    Assignees: KOREA INTERNET & SECURITY AGENCY, Lambda256. CO., LTD
    Inventors: Yong Hee Shin, Moon Hee Cho, Kyeong Han Kim, Dae Il Jang, Seung Goo Ji, Jae Hoon Oh
  • Publication number: 20220237240
    Abstract: A method for collecting dark web information is provided. The method for collecting dark web information is performed by a computing device and comprises obtaining a list of onion addresses of a plurality of target dark web sites, accessing at least one of the plurality of target dark web sites, collecting web page information of the accessed dark web site, storing information on the accessed dark web site by analyzing the collected web page information and providing an analysis result of the accessed dark web site by using the stored information on the accessed dark web site.
    Type: Application
    Filed: April 12, 2022
    Publication date: July 28, 2022
    Applicant: KOREA INTERNET & SECURITY AGENCY
    Inventors: Kyeong Han KIM, Moon Hee CHO, Yong Hee SHIN
  • Publication number: 20220198443
    Abstract: A method for identifying a wallet address associated with a virtual asset service provider is provided. The method comprises receiving a target wallet address, obtaining a transaction of a virtual asset associated with the target wallet address, obtaining a list of a plurality of known wallet addresses of virtual asset service providers (VASPs) and identifying a type of the target wallet address, by performing at least one of a cold wallet determination routine and a hot wallet determination routine for the target wallet address, based on the transaction and the list of known wallet addresses of the VASPs.
    Type: Application
    Filed: October 15, 2021
    Publication date: June 23, 2022
    Applicants: KOREA INTERNET & SECURITY AGENCY, Lambda256, CO., LTD
    Inventors: Yong Hee SHIN, Moon Hee CHO, Kyeong Han KIM, Dae Il JANG, Seung Goo JI, Jae Hoon OH
  • Publication number: 20220201011
    Abstract: Provided is a method performed by a computing device for classifying a type of exploit.
    Type: Application
    Filed: March 29, 2021
    Publication date: June 23, 2022
    Applicant: KOREA INTERNET & SECURITY AGENCY
    Inventors: Jae Hyuk Lee, Woong Go, Hong Geun Kim, Sung Taek Oh
  • Publication number: 20220191113
    Abstract: Provided is a method performed by a computing device for monitoring an abnormal behavior of a plurality IoT devices. The method comprises determining abnormality of a behavior of each of the plurality of IoT devices based on traffic data representing the behavior of each of the plurality of IoT devices, clustering the behavior of each of the plurality of IoT devices based on the traffic data and a result of the determining the abnormality and generating data for representing a plurality of clusters formed as a result of the clustering such that a first cluster corresponding to a normal behavior cluster and a second cluster corresponding to an abnormal behavior cluster are displayed on different planes, the first cluster and the second cluster being divided based on the result of the determining the abnormality.
    Type: Application
    Filed: March 22, 2021
    Publication date: June 16, 2022
    Applicant: KOREA INTERNET & SECURITY AGENCY
    Inventors: Sung Taek Oh, Woong Go, Hong Geun Kim, Jae Hyuk Lee
  • Patent number: 11350282
    Abstract: Provided is a method for detecting abnormal traffic. The method comprises collecting non-access stratum (NAS) traffic between a user equipment (UE) and a mobility management node, identifying a ciphering algorithm supported by the UE from a network access request message transmitted from the UE to the mobility management node, and identifying the UE as a first type of terminal at risk based on a determination that the UE only supports a null ciphering algorithm.
    Type: Grant
    Filed: May 27, 2021
    Date of Patent: May 31, 2022
    Assignee: KOREA INTERNET & SECURITY AGENCY
    Inventors: Do Won Kim, Seong Min Park, Bo Min Choi, Young Kwon Park, Jin Hyun Cho, Hyung Jin Cho, Sung Moon Kwon
  • Publication number: 20220156320
    Abstract: Provided is a method performed by a computing device for identifying a device. The method include receiving a target packet from an identification target device, extracting a pattern of the target packet, the target packet being transmitted by the identification target device from the packet, matching the pattern of the target packet with at least one of packet patterns stored in an identification information DB, comparing a first model name with a second model name, the first model name being corresponding to the matched pattern stored in the identification information DB, the second model name being selected by a user of a user terminal, and transmitting a proposed model name to the user terminal based on determining that the first model name and the second model name are different, the proposed model name being used for connection between the user terminal and the identification target device.
    Type: Application
    Filed: March 12, 2021
    Publication date: May 19, 2022
    Applicant: KOREA INTERNET & SECURITY AGENCY
    Inventors: Jae Hyuk Lee, Woong Go, Hong Geun Kim, Sung Taek Oh