Patents by Inventor Jung-Chan Na

Jung-Chan Na has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100212013
    Abstract: There are provided a system and method for tracing back an attacker by using centroid decomposition technique, the system including: a log data input module collecting log data of an intrusion alarm from an intrusion detection system; a centroid node detection module generating a shortest path tree by applying a shortest path algorithm to network router connection information collected by a network administration server, detecting a centroid node by applying centroid decomposition technique removing a leaf-node to the shortest path tree, and generating a centroid tree whose node of each level is the detected centroid node; and a traceback processing module requesting log data of a router matched with the node of each level of the centroid tree, and tracing back a router identical to the log data of the collected intrusion alarm as a router connected to a source of an attacker by comparing the log data of the router with the log data of the collected intrusion alarm.
    Type: Application
    Filed: November 21, 2007
    Publication date: August 19, 2010
    Applicant: Electronics and Telecommunications Research Instit
    Inventors: Jong Hyun Kim, Geon Lyang Kim, Seon Gyoung Sohn, Beom Hwan Chang, Chi Yoon Jeong, Jong Ho Ryu, Jung Chan Na, Jong Soo Jang, Sung Won Sohn
  • Publication number: 20100169479
    Abstract: Provided are an apparatus and method for extracting user information using a client-based script in which user information including the internet protocol (IP) addresses of an attacking host and an anonymous proxy server used by the attacking host can be collected using a client-based script that can be automatically executed in the web browser of the attacking host. According to the apparatus and the method, it is possible to detect the location of an attacking host without alerting the attacking host by using a script that can be automatically executed in a web browser of the attacking host without any program installation. In addition, according to the apparatus and the method, it is possible to collect the IP addresses of an attacking host and an anonymous proxy server, if any, used by the attacking host by directly connecting the attacking host and a monitoring server.
    Type: Application
    Filed: October 21, 2009
    Publication date: July 1, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Chi Yoon JEONG, Beom-Hwan CHANG, Seon-Gyoung SOHN, Geon Lyang KIM, Jong Ho RYU, Jong Hyun KIM, Jung-Chan NA, Hyun Sook CHO, Chae Kyu KIM
  • Publication number: 20100162392
    Abstract: An apparatus for monitoring the security status of a wireless network is provided. The apparatus includes a radio frequency (RF) signal collection unit which collects at least one piece of RF signal information; a security event information collection unit which collects security event information including at least one of traffic information and alert information; a security event information mapping unit which maps the RF signal information and the security event information based on the correlation between the RF signal information and the security event information; and a security event information display unit which displays the result of the mapping performed by the security event information mapping unit.
    Type: Application
    Filed: June 11, 2009
    Publication date: June 24, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Chi Yoon JEONG, Beom Hwan CHANG, Seon Gyoung SOHN, Jong Ho RYU, Geon Lyang KIM, Jong Hyun KIM, Jung-Chan NA, Hyun Sook CHO, Chae Kyu KIM
  • Publication number: 20100150008
    Abstract: There are provided a network state display apparatus and method capable of easily determining a present network security state in real time by analyzing an abnormality and harmful traffic deteriorating performance of a network in software by using a result of combining essential characteristics of traffic, a distinct dispersion, and an entropy and displaying the network state to be intuitionally recognized, the method including selecting and combining three of a source address, a source port, a destination address, and a destination port of collected traffic and calculating a distinct dispersion and an entropy of a residual one therefrom; displaying the calculated distinct dispersion and entropy on a security radar where the distinct dispersion and the entropy are assigned to an angle and a radius; determining whether a network state is abnormal, based on a result displayed on the security radar; and detecting reporting detailed information on abnormal traffic causing the abnormal network state.
    Type: Application
    Filed: March 7, 2008
    Publication date: June 17, 2010
    Inventors: Seon Gyoung Sohn, Chi Yoon Jeong, Beom Hwan Chang, Soo Hyung Lee, Hyo Chan Bang, Geon Lyang Kim, Hyun Joo Kim, Won Joo Park, Jong Ho Ryu, Jong Hyun Kim, Jung Chan Na, Jong Soo Jang, Sung Won Sohn
  • Publication number: 20100100619
    Abstract: There are provided a network security state visualization device and method, the device including: a security event collector collecting original security event information from network security apparatuses; a security event analyzer analyzing the original security event information collected by the security event collector and extracting characteristic data corresponding to a security event; and a three-dimensional visualization display unit visualizing a correlation between the characteristic data extracted by the security event analyzer as a three-dimensional screen to be displayed.
    Type: Application
    Filed: October 24, 2007
    Publication date: April 22, 2010
    Inventors: Beom Hwan Chang, Chi Yoon Jeong, Seon Gyoung Sohn, Soo Hyung Lee, Hyo Chan Bang, Geon Lyang Kim, Hyun Joo Kim, Won Joo Park, Jong Ho Ryu, Jong Hyun Kim, Jung Chan Na, Jong Soo Jang, Sung Won Sohn
  • Publication number: 20100067391
    Abstract: An apparatus and method for visualizing a network condition related to a network security are provided. The apparatus includes a traffic feature extracting unit, a network condition displaying unit, and a traffic abnormal condition determining unit. The traffic feature extracting unit extracts information including source address, source port, destination address, and destination port from network traffics, selects two of the extracted information, and calculates unique dispersion degrees of two unselected information. The network condition displaying unit displays a two-dimensional cube expressed using the calculated unique dispersion degrees for the classified traffics. The traffic abnormal condition determining unit determines whether the traffics are in an abnormal condition or not based on the two-dimensional security cube.
    Type: Application
    Filed: August 23, 2007
    Publication date: March 18, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Beom-Hwan Chang, Chi-Yoon Jeong, Seon-Gyoung Sohn, Soo-Hyung Lee, Hyo-Chan Bang, Geon-Lyang Kim, Hyun-Joo Kim, Won-Joo Park, Jong-Ho Ryu, Jong-Hyun Kim, Jong-Soo Jang, Sung-Won Sohn, Jung-Chan Na
  • Publication number: 20100030892
    Abstract: Disclosed is a GIS based network information monitoring system that intuitively combines GIS based geographic information with traffic information and a security event, expresses the combined geographic information on a display, and does not need position calibration of network information when the traffic information and the security event are expressed.
    Type: Application
    Filed: May 22, 2009
    Publication date: February 4, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Chi Yoon Jeong, Beom Hwan Chang, Seon Gyoung Sohn, Geon Lyang Kim, Jong Hyun Kim, Jong Ho Ryu, Jung Chan Na, Hyun Sook Cho
  • Publication number: 20100030891
    Abstract: Provided are a web-based traceback system and method using reverse caching proxy, which can effectively protect a web server against various attacks launched by illegitimate user by acquiring network information and location information of users who attempt to access the web server through an anonymous server, without a requirement of installing any agent program in the users' clients.
    Type: Application
    Filed: May 18, 2009
    Publication date: February 4, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Jong Hyun KIM, Geon Lyang KIM, Jong Ho RYU, Chi Yoon JEONG, Seon Gyoung SOHN, Beom Hwan CHANG, Jung-Chan NA, Hyun Sook CHO
  • Patent number: 7596810
    Abstract: Provided is an apparatus for detecting a network attack situation. The apparatus includes an alarm receiver receiving a plurality of alarms raised in a network to which the alarm receiver is connected, converting the alarms into predetermined alarm data, and outputting the alarm data; an alarm processor analyzing an attack situation in the network based on attributes of the alarm data and a number of times that the alarm data is generated; a memory storing basic data needed to analyze the state of the network and providing the basic data to the alarm processor; and an interface transmitting the result of the analysis by the alarm processor to an external device, receiving a predetermined critical value from the external device, which is a basis for determining the occurrence of the attack situation, and outputting the critical value to the alarm processor such that the alarm processor can store the critical value in the memory.
    Type: Grant
    Filed: March 17, 2005
    Date of Patent: September 29, 2009
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jin Oh Kim, Seon Gyoung Sohn, Hyochan Bang, Soo Hyung Lee, Dongyoung Kim, Beom Hwan Chang, Geon Lyang Kim, Hyun Joo Kim, Jung Chan Na, Jong Soo Jang, Sung Won Sohn
  • Patent number: 7539147
    Abstract: Provided is an apparatus for detecting and visualizing anomalies in network traffic which includes a traffic information storing portion storing information on network traffic, a traffic state display portion presenting a status of the network traffic generated for a predetermined threshold time based on the information on network traffic on an orthogonal coordinates system in a form of a graph connecting at least one point data as a coordinate value, and a traffic anomalies determination portion determining an existence of anomalies in the network traffic based on a shape of the graph.
    Type: Grant
    Filed: March 11, 2005
    Date of Patent: May 26, 2009
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Beom Hwan Chang, Soo Hyung Lee, Jin Oh Kim, Jung Chan Na, Jong Soo Jang, Sung Won Sohn
  • Publication number: 20090094699
    Abstract: Provided is an apparatus for detecting a network attack situation. The apparatus includes an alarm receiver receiving a plurality of alarms raised in a network to which the alarm receiver is connected, converting the alarms into predetermined alarm data, and outputting the alarm data; an alarm processor analyzing an attack situation in the network based on attributes of the alarm data and a number of times that the alarm data is generated; a memory storing basic data needed to analyze the state of the network and providing the basic data to the alarm processor; and an interface transmitting the result of the analysis by the alarm processor to an external device, receiving a predetermined critical value from the external device, which is a basis for determining the occurrence of the attack situation, and outputting the critical value to the alarm processor such that the alarm processor can store the critical value in the memory.
    Type: Application
    Filed: November 21, 2008
    Publication date: April 9, 2009
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Jin Oh KIM, Seon Gyoung Sohn, Hyochan Bang, Soo Hyung Lee, Dongyoung Kim, Beom Hwan Chang, Geon Lyang Kim, Hyun Joo Kim, Jung Chan Na, Jong Soo Jang, Sung Won Sohn
  • Patent number: 7200866
    Abstract: A system for defending against a distributed denial-of-service attack includes an intrusion detection system, an active security management system and an active security node. The intrusion detection system generates alert data if a denial-of-service attack is detected. The active security management system manages a domain, analyzes the alert data, generates and transmits a backtracking sensor in a case of the distributed denial-of-service attack, transmits mobile sensors to a host backtracked by the backtracking sensor to remove a master or an agent program within the host; and generates and transmits a backtracking sensor by using an IP address of a host that has transmitted a packet to the removed master or agent program. The active security node executes the transmitted backtracking sensor to backtrack an attacking host of the distributed denial-of-service attack and, if the backtracked host is determined as a real attacker, intercepts a traffic generated from the real attacker.
    Type: Grant
    Filed: August 14, 2003
    Date of Patent: April 3, 2007
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Hyun Joo Kim, Jung-Chan Na, Sung Won Sohn
  • Patent number: 7093290
    Abstract: Disclosed are a system and method of sharing intrusion detection information detected at different networks and tracking the intrusion, to thereby defense against the intrusion on a network to which an intruder belongs, and a computer-readable medium storing a program for implementing the above method therein. The system detects an intrusion through the analysis of an input packet, adds information associated with the intrusion into the packet, creates an active packet and transmits the active packet to an address of an intruder, which transmitted the packet. Thereafter, the system tracks the intrusion, for all routes through which the intruder passed based on the active packet, and filters the packet associated with the intruder for the isolation thereof.
    Type: Grant
    Filed: November 16, 2001
    Date of Patent: August 15, 2006
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Min-Ho Han, Jung-Chan Na, Sung Won Sohn
  • Publication number: 20050144457
    Abstract: A message security processing system and method for Web services are provided. In the message security processing system in which messages are exchanged between a client and a server with a SOAP-RPC format, each of the client and the server includes: a security interface allowing information related to digital signature, encryption, and timestamp insertion to be set in a security context object for an application program to meet security requirements of the client or the server; a security handler receiving the security context object from the security interface, and performing security processing of a request message by calling security objects stored in a request queue of the security context object one by one in order or performing security processing of a response message by calling security objects stored in a response queue of the security context object one by one in order; and an XML security unit supporting an XML security functions by called by the security handler.
    Type: Application
    Filed: September 8, 2004
    Publication date: June 30, 2005
    Inventors: Jae Seung Lee, Ki Young Moon, Jung Chan Na, Sung Won Sohn, Chee Hang Park
  • Publication number: 20050108377
    Abstract: Disclosed is a method of detecting abnormal traffic at the network level using a statistical analysis and a computer-readable recording medium for recording a program that implements the method. The method includes the steps of: a) gathering local traffic data from each network device and integrating a plurality of the local traffic data to generate traffic data in a network level; b) extracting a characteristic traffic data based on the traffic data in the network level; c) comparing the characteristic traffic data with a characteristic traffic data profile resulting from statistical computations, and determining whether there is abnormal traffic in the network; and d) updating the characteristic traffic data profile using the characteristic traffic data if there is no abnormal traffic in the network, analyzing seriousness of the abnormal traffic and monitoring the abnormal traffic if there is abnormal traffic in the network.
    Type: Application
    Filed: December 31, 2003
    Publication date: May 19, 2005
    Inventors: Soo-Hyung Lee, Beom-Hwan Chang, Jin-Oh Kim, Jung-Chan Na, Sung-Won Sohn, Chee-Hang Park
  • Publication number: 20040098618
    Abstract: A system for defending against a distributed denial-of-service attack includes an intrusion detection system, an active security management system and an active security node. The intrusion detection system generates alert data if a denial-of-service attack is detected. The active security management system manages a domain, analyzes the alert data, generates and transmits a backtracking sensor in a case of the distributed denial-of-service attack, transmits mobile sensors to a host backtracked by the backtracking sensor to remove a master or an agent program within the host; and generates and transmits a backtracking sensor by using an IP address of a host that has transmitted a packet to the removed master or agent program. The active security node executes the transmitted backtracking sensor to backtrack an attacking host of the distributed denial-of-service attack and, if the backtracked host is determined as a real attacker, intercepts a traffic generated from the real attacker.
    Type: Application
    Filed: August 14, 2003
    Publication date: May 20, 2004
    Inventors: Hyun Joo Kim, Jung-Chan Na, Sung Won Sohn
  • Publication number: 20030218988
    Abstract: A network using an open shortest path first (OSPF) protocol includes a routing table for transferring an active packet; and a plurality of active nodes. The plurality of active nodes generates an opaque link state advertisement (LSA) having active network topology information and floods the generated opaque LSA to nodes through the OSPF domain. The active nodes also receives an opaque LSA transferred from the nodes and, then, updates the routing table for transferring the active packet based on the received opaque LSA.
    Type: Application
    Filed: September 6, 2002
    Publication date: November 27, 2003
    Inventors: Min-Ho Han, Jung-Chan Na, Sung Won Sohn