Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 43. Отображено 43.
16-05-2017 дата публикации

인삼 균핵병균 진단 방법

Номер: KR0101736599B1
Принадлежит: 주식회사 한국인삼공사

... 본 발명은 인삼 균핵병균 진단용 프라이머 세트에 관한 것으로, 본 발명에 따른 인삼 균핵병균 진단용 프라이머 세트를 이용함으로써 식물체 및 토양에서 극미량의 인삼 균핵병균도 효율적으로 검출이 가능하며, 인삼 균핵병균 감염 여부를 확인할 수 있으므로, 인삼 균핵병의 조기진단을 필요로 하는 인삼 재배지에서 용이하게 사용될 수 있다.

Подробнее
03-08-2017 дата публикации

INTELLIGENCE ANALYSIS MODULE FORMING INFRINGEMENT INFORMATION INTELLIGENCE ANALYSIS SYSTEM

Номер: KR1020170089273A
Принадлежит:

According to the present invention, an intelligence analysis module forms an infringement information intelligence analysis system of an accumulated and integrated intelligence system (AEGIS) and comprises: an analysis information extraction unit for inquiring base information necessary for intelligence analysis and requesting collection of additional information; an N-Depth analysis unit for constructing an N-Depth association relation corresponding to a depth setting value by using an analysis information extraction function, and mapping the same with infringement information data to convert the mapped result into data of an intelligence format; and an association relation analysis unit for selecting comparison targets of infringement resources for association relation analysis, and comparing and inquiring information used equally or similarly among the selected comparison targets. The present invention provides a design method for an AEGIS of an integrated security situation analysis ...

Подробнее
05-09-2018 дата публикации

CYBER KILL CHAIN CLASSIFICATION METHOD IN INCIDENT GRAPH DATABASE AND DEVICE THEREOF

Номер: KR1020180099246A
Принадлежит:

The present invention relates to a cyber kill chain (CKC) classification method in an incident graph database, which is easy to set a strategy against incident, and a device thereof. According to one embodiment of the present invention, the CKC classification method of a CKC classification device in an incident graph database comprises: a step of allowing a CKC classification device to generate a CKC attribute of all nodes forming the incident graph database and initialize the CKC attribute value; a step of allowing the CKC classification device to select a single incident for CKC classification in the incident graph database; a step of allowing the CKC classification device to use one or more classification standards among first to third CKC classification standards with respect to relationship, which is allocated to all nodes forming the selected single incident accident and all edges connecting the node, in order to perform CKC classification; and a step of allowing the CKC classification ...

Подробнее
08-08-2018 дата публикации

METHOD FOR ANALYZING CYBER THREAT INTELLIGENCE DATA AND APPARATUS THEREOF

Номер: KR101886147B1
Принадлежит: KOREA INTERNET & SECURITY AGENCY

The present invention relates to a method for analyzing cyber threat intelligence (CTI) data and an apparatus thereof, capable of facilitating access to data by analyzing cyber threat intelligence data built with a graph database. The method for analyzing CTI data according to an embodiment of the present invention includes the following steps: obtaining a first CTI graph including a first vertex composed of first CTI data classified based on a first classification item and a second CTI graph including a second vertex composed of second CTI data classified based on the first classification item; classifying the first CTI data and the second CTI data based on a second classification item determined according to the first classification item; and outputting the graph similarity of the first CTI graph and the second CTI graph, which is determined based on the first CTI similarity between the first CTI data and the second CTI data when the first CTI data and the second CTI data belong to the ...

Подробнее
03-08-2017 дата публикации

INFRINGEMENT INFORMATION MANAGING MODULE COMPRISING INFRINGEMENT INFORMATION INTELLIGENCE ANALYSIS SYSTEM

Номер: KR1020170089129A
Принадлежит:

An infringement information managing module according to the present invention comprises: an infringement accident-related information collecting unit which analyzes information received from an infringement accident-related information collecting system, and logs the analyzed information; an infringement information ID management unit which searches for an ID of the infringement information stored in an infringement information DB, and issues an ID for infringement information which has not assigned with the ID, according to a search result; and an infringement information management unit which searches for or stores raw data stored in the infringement information DB or correlation data, and searches for information, derived by an analysis ground defined by a system or an administrator, in the infringement information DB. The present invention designs an accumulated and integrated intelligence system (AEGIS) of an integrated security analysis system comprising a collecting system and an ...

Подробнее
11-03-2016 дата публикации

PAYLOAD ENCRYPTION DETECTING SYSTEM OF NETWORK TRAFFIC AND METHOD THEREOF

Номер: KR101602885B1
Принадлежит: KOREA INTERNET & SECURITY AGENCY

The present invention relates to a payload encryption detecting system of network traffic to distinguish and provide traffic which is normally encrypted and traffic which is not encrypted and generated by a malignant code by applying a statistical randomness test to a payload, and a method thereof. The payload encryption detecting system of the network traffic comprises: a traffic collection unit to collect traffic transmitted by a network from a predetermined port; a traffic analysis unit to apply the traffic collected by the traffic collection unit to a statistical teat algorithm, to analyze whether the traffic can be distinguished with a random number or not, and to provide an analyzed result; and a traffic classifying unit to receive the analyzed result of the traffic analysis unit, to classify the traffic into abnormal traffic if the number of lists capable of being distinguished with the random number is more than or equal to the number of predetermined lists and to classify the traffic ...

Подробнее
04-04-2018 дата публикации

침해 사고 정보의 재귀적 수집 방법 및 그를 실행하는 프로그램이 기록된 컴퓨터 판독 가능한 매체

Номер: KR0101832292B1
Принадлежит: 한국인터넷진흥원

... 본 실시예는 제1 정보 공유 채널을 통해 침해 사고를 발생시키는 적어도 하나의 침해 악용 자원을 수집하고, 제2 정보 공유 채널에 접속하여 상기 수집된 적어도 하나의 침해 악용 자원마다 상기 침해 사고간 유사성을 갖는 침해 연관 정보를 조회/수집하며, 수집된 침해 연관 정보를 상기 침해 악용 자원의 연관 구조를 확보하기 위한 재귀적으로 분류하는 메카니즘을 제공한다. 이에, 본 실시예는 침해사고 정보 수집을 통해. 그에 따른 침해 연관 정보를 수집 및 분류하는 체계를 제시함으로써 침해사고 Intelligent 분석의 방향성을 제시할 수 있기 때문에, 차후 침해 사고시 신속한 대응이 가능하다.

Подробнее
11-06-2018 дата публикации

METHOD FOR DIAGNOSING RHIZOCTONIA SOLANI

Номер: KR1020180062730A
Принадлежит:

The present invention relates to a probe for diagnosing Rhizoctonia solani which causes damping off, and a primer. According to the present invention, a method for diagnosing Rhizoctonia solani in plants using the probe and a primer set enables detection of DNA at concentration of 1 fg, and detection can be carried out by collecting the plants during a plant cultivation period, thereby preventing spread of disease through early diagnosis. COPYRIGHT KIPO 2018 ...

Подробнее
05-09-2018 дата публикации

METHOD OF ATTACKER PROFILING IN INFRINGEMENT ACCIDENT GRAPH DATABASE

Номер: KR1020180099252A
Принадлежит:

According to one embodiment of the present invention, a method of attacker profiling in an infringement accident graph database comprises the following steps. An attacker profiling device classifies infringement resources stored in all nodes constituting an infringement accident graph database according to a first profiling criterion. Then, the attacker profiling device profiles an attacker according to a second profiling criterion linked with the first profiling criterion for the infringement resources classified according to the first profiling criterion. Therefore, the method is easy to establish a preliminary strategy for a specific attacker. COPYRIGHT KIPO 2018 (AA) Start (BB) End (S310) Classify infringement resources stored in all nodes constituting an infringement accident graph database according to a first profiling criterion (S320) Profile an attacker according to a second profiling criterion linked with the first profiling criterion for the infringement resources classified ...

Подробнее
27-07-2017 дата публикации

METHOD AND INCIDENT MANAGEMENT SYSTEM FOR MANAGING INCIDENT INFORMATION, AND COMPUTER-READABLE RECORDING MEDIUM

Номер: KR1020170086896A
Принадлежит:

According to an embodiment, when collecting or checking an incident abuse source, incident connection information, and incident information collected or generated from an external incident sharing channel, provided is a mechanism which can manage the incident abuse source, the incident connection information, and the incident information by applying at least one index (ID) considering organic connection relation thereof. Therefore, according to an embodiment, through managing incident information, an incident correlation is comprehended, and the incident correlation can be classified and systematically managed to provide directivity of intelligent analysis with respect to an incident which occurs later. COPYRIGHT KIPO 2017 (210) Collecting an incident abuse source and incident connection information from an incident sharing channel, and generating incident information for recursively classifying the incident connection information (220) Storing the incident abuse source, the incident connection ...

Подробнее
03-08-2017 дата публикации

INFRINGEMENT INFORMATION INTELLIGENCE ANALYSIS SYSTEM

Номер: KR1020170089128A
Принадлежит:

An infringement information intelligence analysis system according to the present invention is composed of an infringement incident related information collection system and an accumulated and integrated intelligence system (AEGIS). The infringement information intelligence analysis system comprises: an infringement information management module for managing information received from the infringement incident related information collection system, and infringement information intelligence analysis related information; a collected information analysis module for extracting an infringement information ID based on the received information and extracting an association with raw data; an intelligence creation and management module for creating intelligence based on policies stored in the system in response to an intelligence creation request, and converting an intelligence format and storing history information for delivery to the outside; and an intelligence analysis module for supporting a ...

Подробнее
24-10-2018 дата публикации

침해 자원 사이의 유사도 산정 방법

Номер: KR0101910789B1
Принадлежит: 한국인터넷진흥원

... 침해 자원 사이의 유사도를 산출하는 방법이 제공된다. 본 발명의 실시예에 따른 방법은 상기 제1 침해 자원과 상기 제2 침해 자원 사이의 유사도를 산출하는 방법은 상기 제1 침해 자원의 속성과 상기 제2 침해 자원의 속성을 비교하고, 비교 결과를 이용하여 상기 제1 침해 자원과 상기 제2 침해 자원의 모든 속성을 i) 상대 침해 자원에도 연관된 제1 타입 ii) 상대 침해 자원의 속성과 값이 유사한 제2 타입 iii) 상대 침해 자원에는 연관되지 않은 제3 타입 중 어느 하나로 식별하는 단계와, 상기 제1 침해 자원의 각 속성에 대하여 상기 제1 침해 자원과 각 속성 사이의 연관 관계에 기반한 가중치를 결정하고, 상기 제2 침해 자원의 각 속성에 대하여 상기 제1 침해 자원과 각 속성 사이의 연관 관계에 기반한 가중치를 결정하는 단계와, 시그모이드(sigmoid) 함수에, (A+B-C)의 값을 변수로서 입력하여 상기 제1 침해 자원과 상기 제2 침해 자원 사이의 유사도를 산출하는 단계를 포함한다.

Подробнее
11-12-2015 дата публикации

MOBILE INFRINGEMENT ANALYSIS SYSTEM AND METHOD THEREOF

Номер: KR101574652B1
Принадлежит: KOREA INTERNET & SECURITY AGENCY

The present invention relates to a mobile infringement analysis system and a method thereof. The system checks whether there is a code inserted to attack the vulnerability of mobile users and whether an app is downloaded and executed without the consent of users by using collected URLs as a target. The system includes: a mobile infringement collection server which collects text messages sent through each communication company server to generate text message detection information, collects URL information based on real-time search words provided by each search engine to generate URL detection information, and collects basic information of app files available in an app market server to generate Android application package (APK) detection information; a mobile infringement analysis server including a URL analysis module, which inspects whether there is a code inserted to attack a mobile device and whether an app is downloaded and executed without the consent of users based on the URL detection ...

Подробнее
07-08-2017 дата публикации

인삼 뿌리썩음병균 진단 방법

Номер: KR0101766056B1
Принадлежит: 주식회사 한국인삼공사

... 본 발명은 인삼 뿌리썩음병균 진단용 프라이머 세트에 관한 것으로, 본 발명에 따른 인삼 뿌리썩음병균 진단용 프라이머 세트를 이용함으로써 식물체 및 토양에서 극미량의 인삼 뿌리썩음병균도 효율적으로 검출이 가능하며, 인삼 뿌리썩음병균 감염 여부를 확인할 수 있으므로, 인삼 뿌리썩음병의 조기진단을 필요로 하는 인삼 재배지에서 용이하게 사용될 수 있다.

Подробнее
26-09-2017 дата публикации

METHOD AND DEVICE FOR VISUALIZING CORRELATION BETWEEN INCIDENT RESOURCES

Номер: KR101780933B1
Принадлежит: KOREA INTERNET & SECURITY AGENCY

Provided is a method to visualize the correlation between incident resources by using a graph database comprising a plurality of resource nodes and an edge between the resource nodes. According to an embodiment, the method includes: a step of generating a first incident resource set including a node, connected through no more than N edges, from a first incident resource node included in the resource nodes; a step of generating a second incident resource set including a node, connected through no more than N edges, from a second incident resource node included in the resource nodes; a step of setting a value of a first flag bit of the node, included in the first incident resource set, as a first value, and setting a value of a second flag bit of the node, included in the second incident resource set, as the first value; a step of classifying each of the nodes, included in the first and second incident resource sets, based on the values of the first and second flag bits; a step of identifying ...

Подробнее
11-05-2017 дата публикации

METHOD FOR DIAGNOSING CYLINDROCARPON DESTRUCTANS

Номер: KR1020170051023A
Принадлежит:

The present invention relates to a primer set for diagnosing Cylindrocarpon destructans. By using the primer set for diagnosing Cylindrocarpon destructans according to the present invention, traces of Cylindrocarpon destructans can be effectively detected in plants and soil, and infection of Cylindrocarpon destructans can be identified so the primer set can be easily used in a ginseng plantation requiring initial diagnosis of root rot on ginseng. COPYRIGHT KIPO 2017 ...

Подробнее
09-07-2015 дата публикации

METHOD FOR DETECTING MALICIOUS CODE INFECTED TERMINAL BASED ON COMMERCIAL E-MAIL

Номер: KR101535503B1
Принадлежит: KOREA INTERNET & SECURITY AGENCY

Provided is a method for detecting a malicious code infected terminal based on a commercial e-mail, which comprises the steps of: detecting reception information from a received e-mail; identifying a unique reception end area by comparing a domain and removing relays on a receiving side; checking whether a false received field is appeared or not by using a from-by tracking method; checking domains corresponded to ′from′ and ′by′, respectively, in every received filed in order to recognize the number of sending domains except a final reception domain; detecting a sending Internet protocol (IP) according to the number of recognized domains; determining whether the detected sending IP violates a mail transmission agent (MTA) or not; and classifying a type of the mail received through attacking methods used according to whether the false received field is appeared or not, the number of the recognized domains, and whether the MTA is violated or not. According to the present invention, an e-mail ...

Подробнее
06-11-2015 дата публикации

SPECIFIC PRIMER FOR SELECTING HEAT-RESISTANT BRASSICA OLERACEA VARIETY AND USE THEREOF

Номер: KR1020150124615A
Принадлежит:

The present invention provides; a oligonucleotide primer set for selecting a heat-resistant Brassica oleracea variety, which comprises a primer set of SEQ ID NO: 7 and SEQ ID NO: 8; a kit for selecting the heat-resistant Brassica oleracea variety comprising the primer set; and a method which selects the heat-resistant Brassica oleracea variety using the primer set. COPYRIGHT KIPO 2016 ...

Подробнее
06-11-2017 дата публикации

침해정보 인텔리젼스 분석 시스템을 구성하는 수집정보 분석모듈

Номер: KR0101794179B1
Принадлежит: 한국인터넷진흥원

... 본 발명에 따른 수집정보 분석모듈은 AEGIS(Accumulated and intEGrated Intelligence System)의 침해정보 인텔리젼스(Intelligence) 분석 시스템을 구성하는 것으로서, 침해사고 연관정보 수집시스템으로부터 수신한 정보에서, 침해자원이나 속성과 같이 침해정보 ID로 관리할 수 있는 정보를 추출하고, 침해정보 ID관리부로부터 침해정보 ID를 획득한 후 상기 추출한 정보를 상기 획득한 침해정보 ID로 대체하는 RA추출부와, 침해정보 ID 추출기능으로 가공된 침해정보 데이터를 분석하여 침해정보 DB에서 관리하는 형태로 변환하는 Raw데이타 관리부와, 상기 수집시스템으로부터 수신한 원본 데이터를 기반으로 침해자원들 간 연관관계와 침해자원과 속성정보 간 연관관계를 분석하여 침해정보DB에서 관리하는 형태로 변환하는 릴레이션십 관리부를 포함하여 구성된다. 본 발명은, 수집 시스템과 분석 시스템으로 이루어진 통합 보안상황 분석시스템의 AEGIS(Accumulated and intEGrated Intelligence System)을 설계하고, 특히 AEGIS의 분석 시스템(예: 침해정보 인텔리젼스 분석 시스템)에 관한 구체적인 구성과 설계 방안을 제시하였다. 또한, 상기 AEGIS의 침해정보 인텔리젼스 분석 시스템에 부속된 수집정보 분석모듈에 관한 구체적인 구성과 설계 방안을 제시하였다.

Подробнее
20-03-2018 дата публикации

침해 사고 정보의 수집 방법 및 그를 실행하는 프로그램이 기록된 컴퓨터 판독 가능한 매체

Номер: KR0101840353B1
Принадлежит: 한국인터넷진흥원

... 본 실시예는 제1 정보 공유 채널을 통해 침해 사고를 발생시키는 적어도 하나의 침해 악용 자원을 수집하고, 제2 정보 공유 채널에 접속하여 상기 수집된 적어도 하나의 침해 악용 자원마다 상기 침해 사고간 유사성을 갖는 침해 연관 정보를 조회/수집하는 메카니즘을 제공한다. 이에, 본 실시예는 침해사고 정보 수집을 통해. 그에 따른 침해 연관 정보를 수집 및 분류하는 체계를 제시함으로써 침해사고 Intelligent 분석의 방향성을 제시할 수 있다.

Подробнее
20-05-2016 дата публикации

SYSTEM FOR COLLECTING AND ANALYZING NETWORK TRAFFIC

Номер: KR101623068B1
Принадлежит: KOREA INTERNET & SECURITY AGENCY

A system for collecting and analyzing network traffic according to the present includes: a traffic collecting module which collects the network traffic by using switch mirroring of a first channel and the past original copy of the traffic retained thus far via a second channel; a blacklist registering module which generates a blacklist by receiving an input of pieces of information which are suspected of an attack from a user; a traffic analyzing module which generates a session log, a weblog and a URL redirect path tree, extracts a portable executable (PE) file inside the traffic and an encrypted payload and analyzes the suspected traffic with reference to the blacklist after restoring the traffic collected by the traffic collecting module; a first database which stores the generated session information log, the generated weblog and the generated URL redirect path tree and the extracted PE file inside the traffic and the extracted encrypted payload; and a second database which stores the ...

Подробнее
08-03-2018 дата публикации

METHOD FOR DIAGNOSING BACTERIA CAUSING GRAY MOLD ROT

Номер: KR101836741B1
Принадлежит: KOREA GINSENG CORP.

The present invention relates to a probe for diagnosing Botrytis cinerea which is bacteria causing gray mold rot, and a primer. According to the present invention, a method for diagnosing bacteria causing gray mold rot in plants using the probe and a primer set enables detection of DNA at concentration of 1 fg, and also allows a user to detect infection by collecting plants while cultivating the same, thereby preventing propagation of diseases via early diagnosis. COPYRIGHT KIPO 2018 ...

Подробнее
19-07-2017 дата публикации

METHOD AND DEVICE THEREOF TO GENERATE INFRINGEMENT ACCIDENT GRAPH DATABASE

Номер: KR101759535B1
Принадлежит: KOREA INTERNET & SECURITY AGENCY

According to an embodiment of the present invention, a method to generate an infringement accident graph database includes: a first step in which an infringement accident graph database generating device generates infringement accident coverage if the infringement accident coverage, which includes first and second nodes connected through a first edge to form an infringement accident graph database, does not exist; a second step in which the infringement accident graph database device determines additional connection to each of the first and second nodes based on a relationship type of the first edge; a third step in which the infringement accident graph database generating device expands the infringement accident coverage to include an expansion node, but the expansion node is connected with one of the first and second nodes, determined to have the additional connection; a fourth step in which the infringement accident graph database generating device repeats the first to third steps for ...

Подробнее
31-05-2016 дата публикации

SYSTEM FOR DETECTING ABNORMAL EVENT SUSPECTED OF ATTACK

Номер: KR101623071B1
Принадлежит: KOREA INTERNET & SECURITY AGENCY

According to the present invention, disclosed is a system for detecting an abnormal event suspected of an attack. The system for detecting an abnormal event suspected of an attack according to the present invention comprises: a data collection device which collects log data and traffic data in real time, and extracts traffic characteristic information from the collected log data and traffic data; and an attack symptom detection device which performs learning via a preset learning model based on the extracted traffic characteristic information, and detects abnormal network traffic based on a result of the learning. COPYRIGHT KIPO 2016 (100) Data collection device (200) Attack symptom detection device (300) Integrated control server ...

Подробнее
03-08-2017 дата публикации

GRAPH DATABASE GENERATING METHOD AND DEVICE FOR INFRINGING RESOURCES

Номер: KR101764674B1
Принадлежит: KOREA INTERNET & SECURITY AGENCY

Provided is a graph database generating method for infringing resources by a graph generating device for infringing resources. The method according to one embodiment comprises the steps of: receiving an infringing resource data set; extracting valid infringing resource information from the infringing resource data set; setting a resource ID for an infringing resource included in the valid infringing resource information; setting an attribute ID for each of a plurality of components of the infringing resource; setting a relationship between the infringing resource for which the resource ID is set and the plurality of components for which the attribute IDs are respectively set; generating a resource node for the infringing resource based on the resource ID; generating the respective attribute nodes for the plurality of components based on the attribute ID; and creating the graph database in which the resource node and the attribute node are connected to an edge indicating the set relationship ...

Подробнее
17-04-2017 дата публикации

METHOD FOR DIAGNOSING BACTERIA CAUSING SCLEROTIAL ROT IN GINSENG

Номер: KR1020170041495A
Принадлежит:

The present invention relates to a primer set for diagnosing bacteria causing sclerotial rot in ginseng. According to the present invention, by using the primer set for diagnosing bacteria causing sclerotial rot in ginseng, even a trace amount of bacteria causing sclerotial rot in ginseng can be efficiently detected in soil and plants, and infection by bacteria causing sclerotial rot in ginseng can be discovered as well. Accordingly, the primer set of the present invention can be easily used in a ginseng plantation where early diagnosis of bacteria causing sclerotial rot in ginseng is required. COPYRIGHT KIPO 2017 ...

Подробнее
03-08-2017 дата публикации

COLLECTED INFORMATION ANALYZING MODULE COMPRISING INFRINGEMENT INFORMATION INTELLIGENCE ANALYSIS SYSTEM

Номер: KR1020170089279A
Принадлежит:

A collected information analyzing module according to the present invention is comprised of an infringement information intelligence analysis system of an accumulated and integrated intelligence system (AEGIS), and comprises: an RA extracting unit which extracts information, which can be managed by an infringement information ID, such as infringement resources or a property, from information received from an infringement accident-related information collecting system, acquires an infringement information ID form an infringement information ID management unit, and replaces the extracted information with the acquired infringement information ID; a raw data management unit which analyzes infringement information data processed by an infringement information ID extracting function to convert the same into a format which is managed by an infringement information DB; and a relationship management unit which analyzes a correlation of infringement resources and a correlation of the infringement ...

Подробнее
23-10-2018 дата публикации

침해 사고 그래프 데이터베이스에서의 사이버 킬 체인 분류 방법 및 그 장치

Номер: KR0101910787B1
Принадлежит: 한국인터넷진흥원

... 본 발명의 일 실시 예에 따른 침해 사고 그래프 데이터베이스에서의 사이버 킬 체인 분류 방법은, 사이버 킬 체인(CKC, Cyber Kill Chain) 분류 장치가, 침해 사고 그래프 데이터베이스(Graph Database)를 구성하는 모든 노드(Node)에 CKC 속성을 생성하고, 상기 생성한 CKC 속성값을 초기화하는 단계, 상기 사이버 킬 체인 분류 장치가, 상기 침해 사고 그래프 데이터베이스 내에서 CKC 분류를 위한 단일 침해 사고를 선택하는 단계, 상기 사이버 킬 체인 분류 장치가, 상기 선택한 단일 침해 사고를 구성하는 모든 노드 및 상기 노드를 연결하는 모든 에지(Edge)에 대하여 부여된 속성인 연결관계(Relationship)에 대하여 제1 내지 제3 CKC 분류 기준 중 어느 하나 이상을 이용하여 CKC 분류를 수행하는 단계 및 상기 사이버 킬 체인 분류 장치가, 상기 수행한 CKC 분류 결과에 따라 상기 선택한 단일 침해 사고를 구성하는 모든 노드에 대하여 상기 초기화한 CKC 속성값을 업데이트하는 단계를 포함한다.

Подробнее
25-09-2017 дата публикации

METHOD AND APPARATUS FOR CALCULATING RISK OF CYBER ATTACK

Номер: KR101781450B1
Принадлежит: KOREA INTERNET & SECURITY AGENCY

The present invention relates to a method and apparatus for quantitatively calculating the risk of a cyber attack by analyzing infringement accident information related to the cyber attack. The method for calculating the risk of a cyber attack performed by the apparatus for calculating the risk of a cyber attack includes the steps of: acquiring infringement accident information related to a risk calculation target attack, wherein the infringement accident information includes a plurality of individual infringement accident information and the plurality of individual infringement accident information is hierarchically composed; calculating an individual risk index indicated by the individual infringement accident information using a preset risk assessment criteria and a predetermined reference risk index; calculating a level risk index by summing the individual risk index according to each level of the infringement accident information; and calculating a total risk index for the risk calculation ...

Подробнее
08-01-2019 дата публикации

사이버 위협 인텔리전스 데이터 분석 방법 및 그 장치

Номер: KR0101936263B1
Принадлежит: 한국인터넷진흥원

... 사이버 위협 인텔리전스(Cyber Threat Intelligence; CTI) 데이터를 분석하는 방법 및 장치가 제공 된다. 본 발명의 일 실시예에 따른 CTI 데이터 분석 방법은, 제1 분류 항목에 기초하여 분류된 제1 CTI 데이터로 구성된 제1 정점(vertex)을 포함하는 제1 CTI 그래프 및 제1 분류 항목에 기초하여 분류된 제2 CTI 데이터로 구성된 제2 정점을 포함하는 제2 CTI 그래프를 획득하는 단계, 제1 분류 항목에 따라 결정되는 제2 분류 항목에 기초하여 제1 CTI 데이터 및 제2 CTI 데이터를 분류하는 단계 및 제1 CTI 데이터 및 제2 CTI 데이터가 동일한 분류에 속하는 경우, 제1 CTI 데이터 및 제2 CTI 데이터 사이의 제1 CTI 유사도에 기초하여 결정되는 제1 CTI 그래프 및 제2 CTI 그래프의 그래프 유사도를 출력하는 단계를 포함한다.

Подробнее
24-10-2018 дата публикации

침해 사고 그래프 데이터베이스에서의 공격자 프로파일링 방법

Номер: KR0101910788B1
Принадлежит: 한국인터넷진흥원

... 본 발명의 일 실시 예에 따른 침해 사고 그래프 데이터베이스에서의 공격자 프로파일링 방법은, 공격자 프로파일링(profiling) 장치가, 침해 사고 그래프 데이터베이스(Graph Database)를 구성하는 모든 노드(Node)에 저장된 침해 자원에 대하여 제1 프로파일링 기준에 따라 분류하는 단계 및 상기 공격자 프로파일링 장치가, 상기 제1 프로파일링 기준에 따라 분류한 침해 자원에 대하여 상기 제1 프로파일링 기준으로부터 연계 가능한 제2 프로파일링 기준에 따라 공격자를 프로파일링하는 단계를 포함한다.

Подробнее
25-09-2017 дата публикации

RICE-DERIVED OsCYP21-4 GENE AND USE THEREOF FOR INCREASING ENVIRONMENTAL STRESS RESISTANCE OF PLANT

Номер: KR1020170107280A
Принадлежит:

The present invention relates to a rice-derived OsCYP21-4 gene and its use for increasing environmental stress resistance of a plant. It can be seen from the present invention that the OsCYP21-4 gene is a gene involved in the oxidative stress of the plant and the environmental stress resistance mechanism of high concentration salt and can be utilized as a gene useful for development of environmental stress resistance crop by introducing the same into useful crops. COPYRIGHT KIPO 2017 ...

Подробнее
13-05-2016 дата публикации

METHOD FOR DETECTING ABNORMAL EVENT SUSPECTED OF ATTACK BASED ON TIME SERIES STATISTICS

Номер: KR101621019B1
Принадлежит: KOREA INTERNET & SECURITY AGENCY

Disclosed is a method for detecting an abnormal event suspected of an attack based on time series statistics according to the present invention. The method for detecting an abnormal event suspected of an attack according to the present invention comprises the steps of: collecting log data and traffic data in real time, and extracting at least one piece of preset traffic characteristic information from the collected log data and traffic data; and performing learning via a time series analysis-based normal traffic learning model based on the extracted traffic characteristic information, and detecting abnormal network traffic based on a result of the learning. COPYRIGHT KIPO 2016 (AA) Start (BB) End (S610) Collect log data/traffic data (S620) Extract traffic characteristic information (S630) Store traffic characteristic information (S640) Perform time-series statistics-based detection (S650) Perform cluster-based detection (S660) Store a result of the detection (S670) Analyze results of the ...

Подробнее
08-11-2018 дата публикации

METHOD FOR COLLECTING CYBER THREAT INTELLIGENCE DATA AND SYSTEM THEREOF

Номер: KR101916676B1
Принадлежит: KOREA INTERNET & SECURITY AGENCY

The present invention provides a method for collecting cyber threat intelligence (CTI) data, and a system thereof. A data collection system according to an embodiment of the present invention includes: a management server for determining an agent setting value corresponding to an OSINT providing source; an agent for receiving the agent setting value from a management server, performing a data collection task for collecting the CTI data based on the agent setting value, and transmitting the CTI data and data collection status information to the management server, a threat information database for recording CTI data; and a system database for recording the data collection status information. It is possible to collect the CTI efficiently. COPYRIGHT KIPO 2018 (10) OSINT providing source (110) Management server (120) Agent (140) System database (150) Threat information database ...

Подробнее
27-07-2017 дата публикации

COLLECTION METHOD OF INCIDENT INFORMATION AND COMPUTER-READABLE RECORDING MEDIUM RECORDED WITH PROGRAM TO PERFORM SAME

Номер: KR1020170086883A
Принадлежит:

According to an embodiment, provided is a mechanism which comprises: collecting at least one incident abuse source generating an incident through a first information sharing channel; and checking and collecting incident connection information having similarity of the incident for the collected incident abuse source by being connected to a second information sharing channel. Therefore, according to an embodiment, through collecting incident information, a system for collecting and classifying incident connection information is provided for directivity of incident intelligent analysis to be provided. COPYRIGHT KIPO 2017 (210) Collecting at least one incident abuse source through a first information sharing channel (220) Checking incident connection information of the incident for the collected incident abuse source by being connected to a second information sharing channel (230) Collecting the checked incident connection information (AA) Start (BB) End ...

Подробнее
08-05-2017 дата публикации

METHOD AND APPARATUS TO COLLECT INFORMATION ABOUT INFRINGEMENT ACCIDENT

Номер: KR101733000B1
Принадлежит: KOREA INTERNET & SECURITY AGENCY

Provided is an infringement accident information collection method to recursively collect infringement accident information required to analyze an infringement accident from an infringement accident information sharing system. According to the present invention, the method comprises: a first collection step of collecting infringed and maliciously used resource information through a first information sharing channel; a second collection step of setting the collected infringed and maliciously used resource information as reference information and collecting infringement-related information inquired as the reference information from a second information sharing channel, wherein the second information sharing channel is determined by being subordinated to a type of the reference information; and a third collection step of setting the infringement-related information as the reference information and repeating the second collection step when the infringement-related information corresponds to ...

Подробнее
06-11-2017 дата публикации

침해 사고 정보를 관리하기 위한 방법과 침해 사고 관리 시스템, 및 컴퓨터 판독 가능한 매체

Номер: KR0101794187B1
Принадлежит: 한국인터넷진흥원

... 본 실시예는 외부의 침해 공유 채널로부터 수집되거나 생성된 침해 악용 자원, 침해 연관 정보 및 침해 정보를 수집 또는 조회시 이들의 유기적인 연관 관계를 고려하여 적어도 하나의 인덱스(ID)를 부여하여 관리할 수 있는 메카니즘이 제공된다. 이에, 본 실시예는 침해사고 정보 관리를 통해, 그에 따른 침해 연관 성을 파악하고, 이를 분류 및 체계적으로 관리함으로써, 차후에 발생하는 침해 사고에 대해 지능적인 분석의 방향성을 제시할 수 있다.

Подробнее
05-09-2018 дата публикации

METHOD FOR CALCULATING SIMILARITY BETWEEN INFRINGEMENT RESOURCES

Номер: KR1020180099355A
Принадлежит:

Provided is a method for calculating the similarity between infringement resources. According to an embodiment of the present invention, a method for calculating the similarity between a first infringement resource and a second infringement resource includes the following steps: comparing an attribute of the first infringement resource and an attribute of the second infringement resource and identifying all attributes of the first infringement resource and the second infringement resource, by using the comparison result, as any one among i) a first type associated with a counterpart infringement resource, ii) a second type having a value similar to an attribute value associated with the counterpart infringement resource, and iii) a third type not associated with the counterpart infringement resource; determining a weight for each of the attributes of the first infringement resource, based on the association between the first infringement resource and each attribute and determining a weight ...

Подробнее
05-09-2018 дата публикации

METHOD AND APPARATUS FOR PREDICTING INFRINGEMENT ACCIDENT

Номер: KR1020180099238A
Принадлежит:

Provided are a method and an apparatus for predicting an infringement accident using an infringement accident graph. The method for predicting an infringement accident, performed by the apparatus for predicting an infringement accident, may include the following steps: calculating an abuse index of each infringement resource node based on the number of branches from the infringement resource node with respect to each of a plurality of infringement resource nodes constituting an infringement accident graph, the abuse index representing a relative frequency that each infringement resource node is abused with respect to each infringement resource node in the infringe accident graph; determining any one prediction reference infringement resource node among the infringement resource nodes; determining a weight to each infringement resource node based on the shortest distance from the prediction reference infringement resource node to another infringement resource node in the infringement accident ...

Подробнее
27-07-2017 дата публикации

METHOD OF COLLECTING INFRINGEMENT CASE INFORMATION, AND COMPUTER-READABLE RECORDING MEDIUM RECORDED WITH PROGRAM TO PERFORM SAME

Номер: KR1020170086898A
Принадлежит:

The present invention provides a mechanism for collecting at least one infringing misapplication resource causing an infringement case through the first information sharing channel, accessing a second information sharing channel to retrieve/collect infringement-associated information having similarities between the infringement cases for at least one collected infringing misapplication resource, and recursively classifying the collected infringement-associated information to acquire an association structure of the infringing misapplication resource. The present invention is able to present the direction of intelligent analysis of infringement by suggesting a system to collect and classify infringement-related information, thus being able to quickly respond to the next infringement. COPYRIGHT KIPO 2017 (210) Collect at least one infringing exploit resource through a first information sharing channel (220) Access a second information sharing channel so as to search infringing association ...

Подробнее
28-05-2018 дата публикации

식물의 환경 스트레스 내성을 증가시키는 벼 유래의 OsCYP21-4 유전자 및 이의 용도

Номер: KR0101861716B1
Принадлежит: 한국생명공학연구원

... 본 발명은 식물의 환경 스트레스 내성을 증가시키는 벼 유래의 OsCYP21-4 유전자 및 이의 용도에 관한 것으로, 본 발명을 통해서 OsCYP21-4 유전자가 식물의 산화적 스트레스와 고 농도 염의 환경 스트레스 내성 기작에 관여하는 유전자임을 알 수 있으며, 이를 유용작물에 도입하여 환경 스트레스 내성 작물 개발에 유용한 유전자로서 활용할 수 있을 것으로 기대한다.

Подробнее
05-04-2016 дата публикации

Specific primer for selecting heat-tolerant Brassica oleracea cultivar and uses thereof

Номер: KR0101609309B1
Автор: 조혜선, 박현지, 정원용
Принадлежит: 한국생명공학연구원

... 본 발명은 서열번호 7 및 9의 프라이머 세트를 포함하는 내서성 양배추 품종을 선별하기 위한 올리고뉴클레오티드 프라이머 세트, 상기 프라이머 세트를 포함하는 내서성 양배추 품종을 선별하기 위한 키트 및 상기 프라이머 세트를 이용한 내서성 양배추 품종을 선별하는 방법을 제공한다.

Подробнее
26-02-2018 дата публикации

침해정보 인텔리젼스 분석 시스템

Номер: KR0101832295B1
Принадлежит: 한국인터넷진흥원

... 본 발명에 따른 침해정보 인텔리젼스 분석 시스템은, 침해사고 연관정보 수집 시스템과 더불어 AEGIS(Accumulated and intEGrated Intelligence System)를 구성하는 것으로서, 상기 침해사고 연관정보 수집시스템으로부터 수신한 정보와 침해정보 인텔리젼스 분석 관련 정보를 관리하는 침해정보 관리모듈과, 상기 수신한 정보를 기반으로 침해정보 아이디(ID)를 추출하고 원본데이터 (Raw Data)와의 연관관계를 추출하는 수집정보 분석 모듈과, 인텔리젼스 생성요청에 대응하여 시스템에 저장되어 있는 정책을 기반으로 인텔리젼스를 생성하고, 외부로의 전달을 위하여 인텔리젼스 포맷을 변환하고 이력정보를 저장하는 인텔리젼스 생성 및 관리 모듈과, 침해정보DB로부터 추출된 정보를 응용한 세부정보 분석(N-Depth 분석)과 연관관계 분석을 지원하는 인텔리젼스 분석모듈을 포함하여 구성된다. 본 발명은, 수집 시스템과 분석 시스템으로 이루어진 통합 보안상황 분석시스템의 AEGIS(Accumulated and intEGrated Intelligence System)을 설계하고, 특히 AEGIS의 분석 시스템(예: 침해정보 인텔리젼스 분석 시스템)에 관한 구체적인 구성과 설계 방안을 제시하였다.

Подробнее