Patents by Inventor Ik Kyun Kim

Ik Kyun Kim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9537887
    Abstract: Disclosed are provided a method and a system for network connection chain traceback by using network flow data in order to trace an attack source site for cyber hacking attacks that goes by way of various sites without addition of new equipment of a network or modification a standard protocol when the cyber hacking attack occurs in the Internet and an internal network.
    Type: Grant
    Filed: March 2, 2015
    Date of Patent: January 3, 2017
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Yang Seo Choi, Ik Kyun Kim, Min Ho Han, Jung Tae Kim, Jong Hyun Kim
  • Publication number: 20160232345
    Abstract: A computing device configured to execute an instruction set is provided. The computing device includes a system call hooker for hooking system calls that occur by the instruction set while the instruction set is executed, a category extractor for extracting a category to which each of the hooked system calls belongs with reference to category information associated with a correspondence relationship between a system call and a category, a sequence extractor for extracting one or more behavior sequences expressed in an N-gram manner from a full sequence of the hooked system calls with reference to the extracted category, and a model generator for generating a behavior pattern model of the system calls that occur when the instruction set is executed, based on a number of times that each of the extracted behavior sequences occurs.
    Type: Application
    Filed: February 5, 2016
    Publication date: August 11, 2016
    Inventors: Dae Sung MOON, Ik Kyun KIM, Han Sung LEE
  • Patent number: 9374382
    Abstract: An apparatus and a method for an attack source traceback capable of tracing back an attacker, that is, an attack source present behind a command and control (C&C) server in a cyber target attack having non-connectivity over a transmission control protocol (TCP) connection are disclosed. The apparatus for the attack source traceback includes: a server information extracting unit detecting an attack for a system, which is generated via a server to thereby extract information on the server; a traceback agent installing unit installing a traceback agent in the server based on the information on the server; and a traceback unit finding an attack source for the system by analyzing network information of the server obtained by the traceback agent.
    Type: Grant
    Filed: October 20, 2014
    Date of Patent: June 21, 2016
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Min-Ho Han, Jung-Tae Kim, Ik-Kyun Kim, Hyun-Sook Cho
  • Patent number: 9374381
    Abstract: According to a method and system for real-time malware detection based on web browser plugin, the method and system may connect a web server of a web site through a web browser module, execute a security module through a browser plugin of the web site, update a database for a browser cache of the web site from the web server by the security module, cache a web content of the web site from the web server, match cache data of the web content with the database, and warn about the web content if data matched with the cache data of the web content does not exist in the database.
    Type: Grant
    Filed: April 10, 2014
    Date of Patent: June 21, 2016
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Jung Tae Kim, Min Ho Han, Jong Hoon Lee, Ik Kyun Kim, Hyun Sook Cho
  • Patent number: 9298175
    Abstract: A method for detecting an abnormal traffic on a control system protocol, includes: checking whether session information exists in a management table; adding a new entry to the management table; checking whether a transaction ID in a table entry is the same as that of the received MODBUS request message; and checking whether data and length thereof of the received MODBUS request message are the same as those in the table entry. Further, the method includes detecting an abnormal traffic; and updating the table entry with packet information of the MODBUS request message.
    Type: Grant
    Filed: July 2, 2013
    Date of Patent: March 29, 2016
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Byoung-Koo Kim, Dong Ho Kang, Seon-Gyoung Sohn, Youngjun Heo, Jung-Chan Na, Ik Kyun Kim
  • Publication number: 20150256555
    Abstract: Disclosed are provided a method and a system for network connection chain traceback by using network flow data in order to trace an attack source site for cyber hacking attacks that goes by way of various sites without addition of new equipment of a network or modification a standard protocol when the cyber hacking attack occurs in the Internet and an internal network.
    Type: Application
    Filed: March 2, 2015
    Publication date: September 10, 2015
    Inventors: Yang Seo CHOI, Ik Kyun KIM, Min Ho HAN, Jung Tae KIM, Jong Hyun KIM
  • Patent number: 9130983
    Abstract: An apparatus for detecting an abnormality sign in a control system, the control system comprising control equipments, network equipments, security equipments or server equipments, the apparatus includes an information collection module configured to collect system information, network information, security event information or transaction information in interworking with a control equipments, network equipments, security equipments or server equipments. The apparatus includes storage module that stores the information collected by the information collection module. The apparatus includes an abnormality detection module configured to analyze a correlation between the collected information and a prescribed security policy to detect whether there is an abnormality sign in the control system.
    Type: Grant
    Filed: June 26, 2013
    Date of Patent: September 8, 2015
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Youngjun Heo, Seon-Gyoung Sohn, Dong Ho Kang, Byoung-Koo Kim, Jung-Chan Na, Ik Kyun Kim
  • Publication number: 20150222648
    Abstract: The present invention provides an attack feature DNA generator comprising: an information processing unit collecting event information from a network environment; a factor extracting unit extracting normal factors and attack feature factors from the event information; a DNA generating unit analyzing correlation of the attack feature factor to the normal factor and generating an attack feature DNA which shows the correlation analysis result in a DNA structure; and a storing unit in which the event information and the attack feature DNA are stored. The present invention allows intuitively recognizing an ongoing attack type by comparing collected cyber-attack feature factors with cyber-attack feature DNAs.
    Type: Application
    Filed: January 13, 2015
    Publication date: August 6, 2015
    Inventors: Jong-Hyun KIM, Ik-Kyun KIM
  • Publication number: 20150220733
    Abstract: The apparatus for detecting a malicious code comprises a feature factor collecting module collecting information of feature factor events from a computing device based on the defined feature factors, a feature factor specification module converting the collected information of feature factor events to feature factor specification data in the form available on the analysis, and a malicious code detection module analyzing if a malicious code is or not by using the specification data.
    Type: Application
    Filed: January 22, 2015
    Publication date: August 6, 2015
    Inventors: Dae-Sung MOON, Ik-Kyun KIM, Hyun-Sook CHO
  • Publication number: 20150199512
    Abstract: Provided are abnormal behavior detecting apparatus and method and the abnormal behavior detecting apparatus, includes: a behavior analyzing unit which analyzes a behavior which occurs for resources of a system based on data collected from a process while the process is executed on the system; a behavior modeling unit which models a behavior analysis result for the resources of the system on a coordinate which is generated based on the behavior for the resources of the system to create a process behavior model corresponding to the resources of the system; a suspicious behavior determining unit which determines a suspicious behavior of the process in accordance with the type of the process behavior model which is implemented on the coordinate; and a process detecting unit which detects a process in which the suspicious behavior occurs as an abnormal behavior process.
    Type: Application
    Filed: April 9, 2014
    Publication date: July 16, 2015
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Hyun Joo KIM, Ik Kyun KIM
  • Publication number: 20150188936
    Abstract: According to a method and system for real-time malware detection based on web browser plugin, the method and system may connect a web server of a web site through a web browser module, execute a security module through a browser plugin of the web site, update a database for a browser cache of the web site from the web server by the security module, cache a web content of the web site from the web server, match cache data of the web content with the database, and warn about the web content if data matched with the cache data of the web content does not exist in the database.
    Type: Application
    Filed: April 10, 2014
    Publication date: July 2, 2015
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Jung Tae KIM, Min Ho HAN, Jong Hoon LEE, Ik Kyun KIM, Hyun Sook CHO
  • Publication number: 20150150133
    Abstract: An apparatus and a method for an attack source traceback capable of tracing back an attacker, that is, an attack source present behind a command and control (C&C) server in a cyber target attack having non-connectivity over a transmission control protocol (TCP) connection are disclosed. The apparatus for the attack source traceback includes: a server information extracting unit detecting an attack for a system, which is generated via a server to thereby extract information on the server; a traceback agent installing unit installing a traceback agent in the server based on the information on the server; and a traceback unit finding an attack source for the system by analyzing network information of the server obtained by the traceback agent.
    Type: Application
    Filed: October 20, 2014
    Publication date: May 28, 2015
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Min-Ho HAN, Jung-Tae KIM, Ik-Kyun KIM, Hyun-Sook CHO
  • Publication number: 20150121072
    Abstract: There is provided an object verification apparatus comprising; a communication module receiving object information to verify an object and integrity of the object, and requesting original object information to an integrity authentication server in which the original object information for the object is registered and receiving the original object information from the integrity authentication server; and a control module determining whether current object information extracted from the object and the object information are identical or not, controlling the communication module according to the determined result, and comparing the original object information and the current object information to verify the final integrity of the object.
    Type: Application
    Filed: April 16, 2014
    Publication date: April 30, 2015
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Yang-Seo CHOI, Ik-Kyun Kim
  • Patent number: 8965823
    Abstract: The present invention relates to an insider threat detection device and method which collects and analyzes a variety of information generated by insiders working for an organization, such as behaviors, events, and states of the insider, and detects an abnormal insider who may become a potential threat. According to the present invention, the insider threat detection method and apparatus analyzes information related to insiders using the correlation analysis method, and previously detects an abnormal sign of an insider who may become a potential threat to an organization, which makes it possible to protect the organization from attacks on systems inside the organization or seizure of important information inside the organization.
    Type: Grant
    Filed: May 18, 2012
    Date of Patent: February 24, 2015
    Assignee: Electronics & Telecommunications Research Institute
    Inventors: Seon Gyoung Sohn, Chi Yoon Jeong, Dong Ho Kang, Jung Chan Na, Ik Kyun Kim, Hyun Sook Cho
  • Publication number: 20140304817
    Abstract: A method for detecting a slow read DoS attack in a virtualized environment, the method comprising: receiving a connection request packet transmitted from a client to a server using a web protocol; checking whether the received packet is a TCP SYN packet or a packet of an HTTP GET request message; when it is checked that the received packet is the packet of the HTTP GET request message, detecting whether the received packet is a packet for the slow read DoS attack by analyzing a window size of the HTTP GET request message.
    Type: Application
    Filed: January 14, 2014
    Publication date: October 9, 2014
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Byoung-Koo KIM, Yangseo CHOI, Ik Kyun KIM
  • Publication number: 20140298399
    Abstract: An apparatus for detecting an abnormality sign in a control system, the control system comprising control equipments, network equipments, security equipments or server equipments, the apparatus includes an information collection module configured to collect system information, network information, security event information or transaction information in interworking with a control equipments, network equipments, security equipments or server equipments. The apparatus includes storage module that stores the information collected by the information collection module. The apparatus includes an abnormality detection module configured to analyze a correlation between the collected information and a prescribed security policy to detect whether there is an abnormality sign in the control system.
    Type: Application
    Filed: June 26, 2013
    Publication date: October 2, 2014
    Inventors: Youngjun HEO, Seon-Gyoung SOHN, Dong Ho KANG, Byoung-Koo KIM, Jung-Chan NA, Ik Kyun KIM
  • Publication number: 20140297004
    Abstract: A method for detecting an abnormal traffic on a control system protocol, includes: checking whether session information exists in a management table; adding a new entry to the management table; checking whether a transaction ID in a table entry is the same as that of the received MODBUS request message; and checking whether data and length thereof of the received MODBUS request message are the same as those in the table entry. Further, the method includes detecting an abnormal traffic; and updating the table entry with packet information of the MODBUS request message.
    Type: Application
    Filed: July 2, 2013
    Publication date: October 2, 2014
    Inventors: Byoung-Koo KIM, Dong Ho KANG, Seon-Gyoung SOHN, Youngjun HEO, Jung-Chan NA, Ik Kyun KIM
  • Publication number: 20130091085
    Abstract: The present invention relates to an insider threat detection device and method which collects and analyzes a variety of information generated by insiders working for an organization, such as behaviors, events, and states of the insider, and detects an abnormal insider who may become a potential threat. According to the present invention, the insider threat detection method and apparatus analyzes information related to insiders using the correlation analysis method, and previously detects an abnormal sign of an insider who may become a potential threat to an organization, which makes it possible to protect the organization from attacks on systems inside the organization or seizure of important information inside the organization.
    Type: Application
    Filed: May 18, 2012
    Publication date: April 11, 2013
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Seon Gyoung SOHN, Chi Yoon Jeong, Dong Ho Kang, Jung Chan Na, Ik Kyun Kim, Hyun Sook Cho
  • Publication number: 20120324573
    Abstract: Provided is an apparatus and method for determining whether or not a specific network session is under a denial-of-service (DoS) attack. The method includes detecting a packet transmitted in the session, initializing the number of attack-suspicion continuation packets, increasing the number of attack-suspicion continuation packets by a predetermined number, and determining that the session is under the DoS attack.
    Type: Application
    Filed: April 23, 2012
    Publication date: December 20, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Dae Won KIM, Yang Seo Choi, Ik Kyun Kim
  • Patent number: 8230503
    Abstract: A method and apparatus for extracting a windows executable file that can search for a pattern related to windows executable files among a large quantity of network packets using a hardware-based session tracking and pattern matching technology and that can extract all packets included in the corresponding session are provided. The method of extracting a windows executable file includes: collecting incoming packets having a payload according to a session of a reference packet having an MZ pattern; performing a portable executable (PE) pattern matching for the collected incoming packets; and forming a PE file based on at least one incoming packet satisfying the PE pattern matching.
    Type: Grant
    Filed: August 17, 2009
    Date of Patent: July 24, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Byoung Koo Kim, Seung Yong Yoon, Ik Kyun Kim, Jin Tae Oh, Jong Soo Jang, Hyun Sook Cho