Patents by Inventor Seon Gyoung Sohn

Seon Gyoung Sohn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150350242
    Abstract: An apparatus and method of displaying a network security situation is provided. The apparatus includes an extraction unit configured to classify a characteristic factor including IP addresses of a transmission node and a reception node from a traffic flow, a network visualization unit configured to generate a domain circle visualizing each of a transmission domain and a reception domain as a circle shape by mapping the IP addresses of the transmission node and the reception node to points on circumference as one to one, arrange the generated domain circle on an axis, and visualize each of a transmission network area and a reception network area as a sphere shape, a session construction unit configured to a session of the visualized transmission network area and reception network visually, and a display unit configured to display the session which is visually constructed.
    Type: Application
    Filed: June 3, 2015
    Publication date: December 3, 2015
    Inventors: Seon Gyoung SOHN, Young Jun HEO
  • Publication number: 20150341380
    Abstract: Provided are a system and method for detecting an abnormal behavior of a control system by analyzing flows of the control system. Flow information of the control network is collected, and flows are classified according to the collected flow information and a flow group is generated. An abnormal behavior of the control system is detected by analyzing flows of the generate flow group. That is, internal systems of the control network are grouped according to functions, and a situation of a system of a group performing the same function is managed to thus quickly detect an abnormal behavior of the control system.
    Type: Application
    Filed: March 24, 2015
    Publication date: November 26, 2015
    Inventors: Young Jun HEO, Seon Gyoung SOHN, Byoung Koo KIM, Dong Ho KANG, Jung Chan NA
  • Patent number: 9130983
    Abstract: An apparatus for detecting an abnormality sign in a control system, the control system comprising control equipments, network equipments, security equipments or server equipments, the apparatus includes an information collection module configured to collect system information, network information, security event information or transaction information in interworking with a control equipments, network equipments, security equipments or server equipments. The apparatus includes storage module that stores the information collected by the information collection module. The apparatus includes an abnormality detection module configured to analyze a correlation between the collected information and a prescribed security policy to detect whether there is an abnormality sign in the control system.
    Type: Grant
    Filed: June 26, 2013
    Date of Patent: September 8, 2015
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Youngjun Heo, Seon-Gyoung Sohn, Dong Ho Kang, Byoung-Koo Kim, Jung-Chan Na, Ik Kyun Kim
  • Patent number: 8965823
    Abstract: The present invention relates to an insider threat detection device and method which collects and analyzes a variety of information generated by insiders working for an organization, such as behaviors, events, and states of the insider, and detects an abnormal insider who may become a potential threat. According to the present invention, the insider threat detection method and apparatus analyzes information related to insiders using the correlation analysis method, and previously detects an abnormal sign of an insider who may become a potential threat to an organization, which makes it possible to protect the organization from attacks on systems inside the organization or seizure of important information inside the organization.
    Type: Grant
    Filed: May 18, 2012
    Date of Patent: February 24, 2015
    Assignee: Electronics & Telecommunications Research Institute
    Inventors: Seon Gyoung Sohn, Chi Yoon Jeong, Dong Ho Kang, Jung Chan Na, Ik Kyun Kim, Hyun Sook Cho
  • Publication number: 20140380458
    Abstract: Disclosed is an apparatus for preventing illegal access of industrial control system and a method thereof in accordance with the present invention. The apparatus for preventing illegal access of industrial control system includes: a first interface communicating a packet by interoperating with a management network group that requests a control command; a second interface communicating a packet by interoperating with a control network group that receives a control command from the management network group and processes it; and a control device, which, when a packet flows therein from the management network group or the control network group, checks whether or not at least one filter rule is set and controls the packet flow between the management network group and the control network group using the filter where the rule is set.
    Type: Application
    Filed: April 4, 2014
    Publication date: December 25, 2014
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Byoung-Koo KIM, Dong-Ho KANG, Seon-Gyoung SOHN, Young-Jun HEO, Jung-Chan NA
  • Publication number: 20140298399
    Abstract: An apparatus for detecting an abnormality sign in a control system, the control system comprising control equipments, network equipments, security equipments or server equipments, the apparatus includes an information collection module configured to collect system information, network information, security event information or transaction information in interworking with a control equipments, network equipments, security equipments or server equipments. The apparatus includes storage module that stores the information collected by the information collection module. The apparatus includes an abnormality detection module configured to analyze a correlation between the collected information and a prescribed security policy to detect whether there is an abnormality sign in the control system.
    Type: Application
    Filed: June 26, 2013
    Publication date: October 2, 2014
    Inventors: Youngjun HEO, Seon-Gyoung SOHN, Dong Ho KANG, Byoung-Koo KIM, Jung-Chan NA, Ik Kyun KIM
  • Publication number: 20140297004
    Abstract: A method for detecting an abnormal traffic on a control system protocol, includes: checking whether session information exists in a management table; adding a new entry to the management table; checking whether a transaction ID in a table entry is the same as that of the received MODBUS request message; and checking whether data and length thereof of the received MODBUS request message are the same as those in the table entry. Further, the method includes detecting an abnormal traffic; and updating the table entry with packet information of the MODBUS request message.
    Type: Application
    Filed: July 2, 2013
    Publication date: October 2, 2014
    Inventors: Byoung-Koo KIM, Dong Ho KANG, Seon-Gyoung SOHN, Youngjun HEO, Jung-Chan NA, Ik Kyun KIM
  • Patent number: 8775613
    Abstract: A network monitoring system includes: a traffic information generating apparatus for generating traffic information. Further, the network monitoring system includes a security event collecting apparatus for collecting the traffic information generated by the traffic information generating apparatus by referring to pre-stored traffic information, grouping the collected traffic information, and then extracting service information. Furthermore, the network monitoring system includes a service abnormal condition detecting apparatus for detecting a port number of a transport layer of service information extracted from the security event collecting apparatus and the occurrence frequency of the transport layer, determining the continuity of the port number and the uniformity of the occurrence frequency, and displaying a service abnormal condition.
    Type: Grant
    Filed: October 13, 2011
    Date of Patent: July 8, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Beom Hwan Chang, Chi Yoon Jeong, Seon-Gyoung Sohn
  • Publication number: 20130091085
    Abstract: The present invention relates to an insider threat detection device and method which collects and analyzes a variety of information generated by insiders working for an organization, such as behaviors, events, and states of the insider, and detects an abnormal insider who may become a potential threat. According to the present invention, the insider threat detection method and apparatus analyzes information related to insiders using the correlation analysis method, and previously detects an abnormal sign of an insider who may become a potential threat to an organization, which makes it possible to protect the organization from attacks on systems inside the organization or seizure of important information inside the organization.
    Type: Application
    Filed: May 18, 2012
    Publication date: April 11, 2013
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Seon Gyoung SOHN, Chi Yoon Jeong, Dong Ho Kang, Jung Chan Na, Ik Kyun Kim, Hyun Sook Cho
  • Patent number: 8341721
    Abstract: Provided are a web-based traceback system and method using reverse caching proxy, which can effectively protect a web server against various attacks launched by illegitimate user by acquiring network information and location information of users who attempt to access the web server through an anonymous server, without a requirement of installing any agent program in the users' clients.
    Type: Grant
    Filed: May 18, 2009
    Date of Patent: December 25, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jong Hyun Kim, Geon Lyang Kim, Jong Ho Ryu, Chi Yoon Jeong, Seon Gyoung Sohn, Beom Hwan Chang, Jung-Chan Na, Hyun Sook Cho
  • Patent number: 8307441
    Abstract: There are provided a system and method for tracing back an attacker by using centroid decomposition technique, the system including: a log data input module collecting log data of an intrusion alarm from an intrusion detection system; a centroid node detection module generating a shortest path tree by applying a shortest path algorithm to network router connection information collected by a network administration server, detecting a centroid node by applying centroid decomposition technique removing a leaf-node to the shortest path tree, and generating a centroid tree whose node of each level is the detected centroid node; and a traceback processing module requesting log data of a router matched with the node of each level of the centroid tree, and tracing back a router identical to the log data of the collected intrusion alarm as a router connected to a source of an attacker by comparing the log data of the router with the log data of the collected intrusion alarm.
    Type: Grant
    Filed: November 21, 2007
    Date of Patent: November 6, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jong Hyun Kim, Geon Lyang Kim, Seon Gyoung Sohn, Beom Hwan Chang, Chi Yoon Jeong, Jong Ho Ryu, Jung Chan Na, Jong Soo Jang, Sung Won Sohn
  • Publication number: 20120240231
    Abstract: An apparatus for detecting a malicious code includes: a malicious code visualization device for generating a graph for a malicious file by using strings in the malicious file, a connection among the strings and entropies for the strings and establishing a malicious code database with the generated graph for the malicious file. The apparatus further includes a malicious code determination device for generating a graph for a specific executable file and comparing the graph for the executable file with graphs for malicious files stored in the malicious code database to detect a malicious code in the executable file.
    Type: Application
    Filed: February 16, 2012
    Publication date: September 20, 2012
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Seon-Gyoung Sohn, Beom Hwan Chang, Jung-Chan Na
  • Publication number: 20120096150
    Abstract: A network monitoring system includes: a traffic information generating apparatus for generating traffic information. Further, the network monitoring system includes a security event collecting apparatus for collecting the traffic information generated by the traffic information generating apparatus by referring to pre-stored traffic information, grouping the collected traffic information, and then extracting service information. Furthermore, the network monitoring system includes a service abnormal condition detecting apparatus for detecting a port number of a transport layer of service information extracted from the security event collecting apparatus and the occurrence frequency of the transport layer, determining the continuity of the port number and the uniformity of the occurrence frequency, and displaying a service abnormal condition.
    Type: Application
    Filed: October 13, 2011
    Publication date: April 19, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Beom Hwan CHANG, Chi Yoon JEONG, Seon-Gyoung SOHN
  • Publication number: 20120090027
    Abstract: An apparatus for detecting an abnormal host based on session monitoring includes: a host information collection unit for collecting information of processes being executed in hosts and information of sessions connected by the hosts; a network traffic monitoring unit for collecting network traffic information; an analysis unit for calculating an entropy of each host based on the collected session information to analyze correlation between hosts based on the calculated entropy and the network traffic information; and a detection unit for detecting an abnormal host and a process causing harmful traffic in the abnormal host based on the correlation and updating a black list based on the detected host and process.
    Type: Application
    Filed: October 12, 2011
    Publication date: April 12, 2012
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Seon-Gyoung SOHN, Beom Hwan CHANG
  • Patent number: 8140671
    Abstract: There are provided an apparatus and method for sampling a security event based on contents of the security event, the apparatus including: a security event accumulation module collecting security events occurring in a network system and storing the security events for each type according to contents of the security event; a security event analysis module calculating distribution of the security events for each type by analyzing the stored security events; and a security event extraction module sampling the stored security events according to the calculated distribution of the security events for each type. The apparatus and method may improve speed of visualization of a security event and a security event analysis apparatus and may increase accuracy thereof.
    Type: Grant
    Filed: November 19, 2007
    Date of Patent: March 20, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Chi Yoon Jeong, Beom Hwan Chang, Seon Gyoung Sohn, Geon Lyang Kim, Jong Hyun Kim, Jong Ho Ryu, Jung Chan Na, Jong Soo Jang, Sung Won Sohn
  • Patent number: 8019865
    Abstract: There are provided a network security state visualization device and method, the device including: a security event collector collecting original security event information from network security apparatuses; a security event analyzer analyzing the original security event information collected by the security event collector and extracting characteristic data corresponding to a security event; and a three-dimensional visualization display unit visualizing a correlation between the characteristic data extracted by the security event analyzer as a three-dimensional screen to be displayed.
    Type: Grant
    Filed: October 24, 2007
    Date of Patent: September 13, 2011
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Beom Hwan Chang, Chi Yoon Jeong, Seon Gyoung Sohn, Soo Hyung Lee, Hyo Chan Bang, Geon Lyang Kim, Hyun Joo Kim, Won Joo Park, Jong Ho Ryu, Jong Hyun Kim, Jung Chan Na, Jong Soo Jang, Sung Won Sohn
  • Patent number: 8014310
    Abstract: An apparatus and method for visualizing a network condition related to a network security are provided. The apparatus includes a traffic feature extracting unit, a network condition displaying unit, and a traffic abnormal condition determining unit. The traffic feature extracting unit extracts information including source address, source port, destination address, and destination port from network traffics, selects two of the extracted information, and calculates unique dispersion degrees of two unselected information. The network condition displaying unit displays a two-dimensional cube expressed using the calculated unique dispersion degrees for the classified traffics. The traffic abnormal condition determining unit determines whether the traffics are in an abnormal condition or not based on the two-dimensional security cube.
    Type: Grant
    Filed: August 23, 2007
    Date of Patent: September 6, 2011
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Beom-Hwan Chang, Chi-Yoon Jeong, Seon-Gyoung Sohn, Soo-Hyung Lee, Hyo-Chan Bang, Geon-Lyang Kim, Hyun-Joo Kim, Won-Joo Park, Jong-Ho Ryu, Jong-Hyun Kim, Jong-Soo Jang, Sung-Won Sohn, Jung-Chan Na
  • Publication number: 20110016525
    Abstract: An apparatus for detecting a network attack includes a traffic image generator for generating a traffic image using traffic information and additional IP information extracted from the traffic information; a network attack detector for comparing similarities between the traffic image and a previously generated traffic image based on a predetermined similarity threshold to detect the presence of the network attack; and a network attack analyzer for analyzing the traffic image at a time when the network attack is detected to detect network attack information and pattern information of the network attack. A representation unit for visualizing the network attack information and the pattern information of the network attack.
    Type: Application
    Filed: December 3, 2009
    Publication date: January 20, 2011
    Inventors: Chi Yoon Jeong, Beom-Hwan Chang, Seon-Gyoung Sohn, Johg Ho Ryu, Geon Lyang Kim, Jonghyun Kim, Jung-Chan Na, Hyun sook Cho
  • Publication number: 20110016208
    Abstract: There are provided an apparatus and method for sampling a security event based on contents of the security event, the apparatus including: a security event accumulation module collecting security events occurring in a network system and storing the security events for each type according to contents of the security event; a security event analysis module calculating distribution of the security events for each type by analyzing the stored security events; and a security event extraction module sampling the stored security events according to the calculated distribution of the security events for each type. The apparatus and method may improve speed of visualization of a security event and a security event analysis apparatus and may increase accuracy thereof.
    Type: Application
    Filed: November 19, 2007
    Publication date: January 20, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Chi Yoon Jeong, Beom Hwan Chang, Seon Gyoung Sohn, Geon Lyang Kim, Jong Hyun Kim, Jong Ho Ryu, Jung Chan Na, Jong Soo Jang, Sung Won Sohn
  • Patent number: 7787394
    Abstract: A network status display device using a traffic flow-radar is provided.
    Type: Grant
    Filed: November 15, 2006
    Date of Patent: August 31, 2010
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Beom Hwan Chang, Jung Chan Na, Geon Lyang Kim, Dong Young Kim, Jin Oh Kim, Hyun Joo Kim, Hyo Chan Bang, Soo Hyung Lee, Seon Gyoung Sohn, Jong Soo Jang, Sung Won Sohn