Intelligent security engine and intelligent and integrated security system using the same
First Claim
1. An intelligent and integrated security system, comprising:
- a firewall for interconnecting and controlling access between external and internal networks;
a plurality of security agents for monitoring a data flow and system calls over the internal network;
an intelligent security engine (ISE) for analyzing an alert message, a traffic information and an event information transferred from the plurality of security agents, to decide if there is an attack and to generate a signature through a learning process; and
a security policy manager (SPM) for managing and applying a security policy to each of the plurality of security agents based on a decision of the ISE.
1 Assignment
0 Petitions
Accused Products
Abstract
A firewall interconnects and controls access between external and internal networks, and a plurality of security agents monitor a data flow and system calls over the internal network. An intelligent security engine (ISE) is for analyzing an alert message, a traffic information and an event information transferred from the plurality of security agents to decide if there is an attack and to generate a signature through a learning process. A security policy manager (SPM) is for managing and applying a security policy to each of the plurality of security agents based on the decision of the ISE. The ISE performs a correlation analysis and a causation analysis on suspicious traffic and events and a detection message transferred from the plurality of security agents. Further, the ISE carries out a pattern analysis and generates a new detection pattern through a self-learning process.
-
Citations
32 Claims
-
1. An intelligent and integrated security system, comprising:
-
a firewall for interconnecting and controlling access between external and internal networks;
a plurality of security agents for monitoring a data flow and system calls over the internal network;
an intelligent security engine (ISE) for analyzing an alert message, a traffic information and an event information transferred from the plurality of security agents, to decide if there is an attack and to generate a signature through a learning process; and
a security policy manager (SPM) for managing and applying a security policy to each of the plurality of security agents based on a decision of the ISE. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An intelligent and integrated security system comprising:
-
a firewall for interconnecting and controlling access between external and internal networks;
a network security agent (NSA) for analyzing a suspicious traffic so as to react to a threat related to a network security;
a host security agent (HSA) for protecting resources of servers located within the network and analyzing a status and activity of the system;
an intelligent security engine (ISE) for analyzing an alert message, a traffic information and an event information transferred from the NSA and HSA to decide if there is an attack and to generate a signature through a learning process;
a security policy manager (SPM) for managing and applying a security policy to each of the plurality of security agents based on a decision of the ISE; and
a firewall security agent (FSA) for adopting the security policy of the SPM and causing the firewall to block a traffic from an attacker, wherein the ISE carries out a correlation analysis and a causation analysis based on a suspicious traffic and event transferred from the NSA and HSA, and performs a pattern analysis on all the reduced forms of traffics and events delivered from the NSA and HSA. - View Dependent Claims (21, 22, 23, 24, 25)
-
-
26. An intelligent security engine comprising:
-
means for receiving all reduced forms of traffic and events from a security agent and receiving a suspicious traffic and event from the security agent;
means for performing a correlation analysis and a causation analysis on the suspicious traffic and event received by the receiving means;
a pattern analysis module for analyzing patterns of all the reduced forms of traffic and events received by the receiving means;
means for generating a new signature based on the results of the correlation analysis, the causation analysis and the pattern analysis;
means for deciding if there is an attack based on the results of correlation analysis, the causation analysis and the pattern analysis; and
means for transferring the decision and the new signature to a security policy manager. - View Dependent Claims (27, 28, 29, 30, 31, 32)
-
Specification