发明名称 |
METHOD OF BACK-TRACKING ATTACKER THROUGH SESSION INFORMATION MANAGEMENT APPLIED WITH CODE MOBILITY |
摘要 |
PURPOSE: A method of back-tracking an attacker through session information management applied with code mobility is provided to track a hacker's connection when a direct invasion attack on a host is detected, thereby identifying the host where a hacker substantially exists. CONSTITUTION: A security managing system decides whether an invasion detecting system senses an invasion on a host(510). If so, the system generates a back-tracking sensor(520). The system moves the back-tracking sensor to the invasion-targeted host(530). The back-tracking sensor inquires of a monitoring sensor about previous path information of an attacker(540). The back-tracking sensor receives the previous path information, and decides whether a host exists in a self domain and other domain(550). If so, the system requests a managing server of the other domain to authenticate the back-tracking sensor(560). The back-tracking sensor moves to other host of the other domain(570). The back-tracking sensor inquires of a monitoring sensor mounted on the other host about the next host path, and performs the step '550'(580). If the next host exists in the same domain, the back-tracking sensor informs a security managing server of the host(590).
|
申请公布号 |
KR20030039731(A) |
申请公布日期 |
2003.05.22 |
申请号 |
KR20010070765 |
申请日期 |
2001.11.14 |
申请人 |
ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE |
发明人 |
JI, JEONG HUN;LEE, SEUNG MIN;LEE, SU HYEONG;NAM, TAEK YONG;OH, SEUNG HUI |
分类号 |
H04L12/22;(IPC1-7):H04L12/22 |
主分类号 |
H04L12/22 |
代理机构 |
|
代理人 |
|
主权项 |
|
地址 |
|