The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 06, 2012

Filed:

Nov. 21, 2007
Applicants:

Jong Hyun Kim, Daejeon, KR;

Geon Lyang Kim, Daejeon, KR;

Seon Gyoung Sohn, Daejeon, KR;

Beom Hwan Chang, Daejeon, KR;

Chi Yoon Jeong, Daejeon, KR;

Jong Ho Ryu, Choongcheongnam-do, KR;

Jung Chan NA, Daejeon, KR;

Jong Soo Jang, Daejeon, KR;

Sung Won Sohn, Daejeon, KR;

Inventors:

Jong Hyun Kim, Daejeon, KR;

Geon Lyang Kim, Daejeon, KR;

Seon Gyoung Sohn, Daejeon, KR;

Beom Hwan Chang, Daejeon, KR;

Chi Yoon Jeong, Daejeon, KR;

Jong Ho Ryu, Choongcheongnam-do, KR;

Jung Chan Na, Daejeon, KR;

Jong Soo Jang, Daejeon, KR;

Sung Won Sohn, Daejeon, KR;

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 11/34 (2006.01);
U.S. Cl.
CPC ...
Abstract

There are provided a system and method for tracing back an attacker by using centroid decomposition technique, the system including: a log data input module collecting log data of an intrusion alarm from an intrusion detection system; a centroid node detection module generating a shortest path tree by applying a shortest path algorithm to network router connection information collected by a network administration server, detecting a centroid node by applying centroid decomposition technique removing a leaf-node to the shortest path tree, and generating a centroid tree whose node of each level is the detected centroid node; and a traceback processing module requesting log data of a router matched with the node of each level of the centroid tree, and tracing back a router identical to the log data of the collected intrusion alarm as a router connected to a source of an attacker by comparing the log data of the router with the log data of the collected intrusion alarm. According to the system and method, an attacker causing a security intrusion event may be quickly detected, a load on the system is reduced, and a passage host exposed to a danger or having weaknesses may be easily recognized, thereby easily coping with an attack.


Find Patent Forward Citations

Loading…