DOI QR코드

DOI QR Code

유비쿼터스 컴퓨팅 시스템의 생존성 개선을 위한 정량적 분석 모델링 기법

A Quantitative Assessment Modeling Technique for Survivality Improvement of Ubiquitous Computing System

  • 발행 : 2005.10.01

초록

유비쿼터스 컴퓨팅 시스템은 하나 이상의 컴퓨터가 네트워크로 상호 연결된 프로세서 시스템이다. 하지만, 기존의 보안 유지 방법은 정성적 탐지 및 대응책으로 공격이 발생한 이후 대응에만 치중하여 능동적 차원의 보안 유지 방법에 대한 연구가 부족하다. 따라서, 본 논문은 정량적인 분석을 통해 범용적 인프라의 개선뿐만 아니라 특정 인프라 공격에 대해서 탐지 및 데응할 수 있는 방법에 대해 제안한다. 이를 위해 시스템의 고정적 요소 정보, 임의의 요소 정보, 공격 유형 모델링을 근간으로 시스템의 보안성을 정량적으로 분석할 수 있도록 생존성에 대한 정의 및 모델링 기법을 사용하였다. 그리고 제안한 기법의 검증을 위해 TCP-SYN 공격과 Code-Red 웜 공격에 대한 생존성 분석을 수행하였다.

Ubiquitous computing system is about networked processors, which is constructed with one or more computers interconnected by the networks. However, traditional security solution lacks a Proactive maintenance technique because of its focusing on developing the qualitative detection and countermeasure after attack. Thus, in this paper, we propose a quantitative assessment modeling technique, by which the general infrastructure can be improved and the attacks on a specific infrastructure be detected and protected. First of all, we develop the definition of survivality and modeling technique for quantitative assessment modeling with the static information on the system random information, and attack-type modeling. in addition, the survivality analysis on TCP-SYN attack and code-Red worm attack is performed for validating the proposed technique.

키워드

참고문헌

  1. M. Weiser, 'Some Computer Science Problems in Ubiquitous Computing,' Communications of the ACM, Vol.36, pp.75 - 84, 1993 https://doi.org/10.1145/159544.159617
  2. M. Satyanarayanan. 'Pervasive Computing: Visioin and Challenges,' IEEE Personal Communications, Aug, 2001 https://doi.org/10.1109/98.943998
  3. Al. Mankin, et al., 'On Design and Evaluation of Intention-Driven ICMP Traceback,' Proceedings of the IEEE International Conference on Computer Communication and Networks, pp.159-165. Oct., 2001 https://doi.org/10.1109/ICCCN.2001.956234
  4. D. Schnackengerg and K. Djahandari, 'Cooperative Intrusion Traceback and Response Architecture,' Proceedings of the 2nd DARPA Information Survivability Conference and Exposition (DISCEX II), pp.56-68, June, 200l https://doi.org/10.1109/DISCEX.2001.932192
  5. J. Cabreraa, et al., 'Proactive Detection of Distributed Denial of Service Attacks using MIB Traffic Variables-A Feasibility Study,' The 7th IFIP/lEEE International Symposium on Integrated Network Management, pp.609-622, May, 2001 https://doi.org/10.1109/INM.2001.918069
  6. D. Kashiwa, E. Chen, and H. Fuji, 'Active Shaping: a Countermeasure against DDoS attacks,' Proceedings of the 2nd IEEE European Conference on Universal Multiservice Networks, pp.171- 179, Apr., 2002 https://doi.org/10.1109/ECUMN.2002.1002103
  7. K. Wan and R. Chang, 'Engineering of a Global Infrastructure for DDoS attacks,' Proceedings of the 10th IEEE International Conference on Networks, pp.419-427, Aug., 2002 https://doi.org/10.1109/ICON.2002.1033348
  8. V. Paxson, 'An Analysis of Using Reflectors in Distributed Denial-of-Service Attacks,' ACM SIGCOMM Computer Communication Review, Vol.31, No.3, pp.38-47, 2001 https://doi.org/10.1145/505659.505664
  9. F. Wang, R. Uppalli, and C. Killian, 'Analysis of Techniques for Building Intrusion Tolerant Server Systems,' Proceedings of Military Communications Conference, pp.729-734, Oct., 2003 https://doi.org/10.1109/MILCOM.2003.1290202
  10. A. Avizienis, J. Laprie, and B. Randell, 'Fundamental Concepts of Dependability,' Proceedings of the 3rd Information Survivability Workshop, pp.7-12, Oct., 2000
  11. J. Reynolds, et al., 'On-line Intrusion Detection Attack Prevention Using Diversity Generate-and-Test, and Generalization,' Proceedings of the 36th Annual Hawaii International Conferences on System Sciences, pp.335-342, Jan., 2003 https://doi.org/10.1109/HICSS.2003.1174911
  12. J. Knight, et al., 'The Willow Architecture: Comprehensive Survivability for Large-Scale Distributed Applications,' Technical Report CU-CS-926-01, Department of Computer Science, University of Colorado, 2001
  13. V. Westmark, 'A Definition for Information System Survivability,' Proceedings of the 37th Annual Hawaii International Conferences on System Sciences, Jan., 2004 https://doi.org/10.1109/HICSS.2004.1265710
  14. B. Madan, et al., 'Modeling and Quantification of Security Attributes of Software Systems,' Proceedings of the International Conference on Dependable Systems and Networks, pp.505-514, June, 2002 https://doi.org/10.1109/DSN.2002.1028941
  15. F. Cohen, 'Simulating Cyber Attacks, Defenses, and Consequences,' Fred Cohen & Associates, 1999
  16. M. Gupta, A. Chaturvedi, and S. Mehta, 'The Experimental Analysis of Information Security Management Issues for Online Financial Services,' Proceedings of the 21st ACM International Conference on Information Systems, pp.667-675, 2000
  17. B. Littlewood, et al., 'Towards Operational Measures of Computer Security,' Journal of Computer Security, pp. 211-229, 1993
  18. R. Ortalo, et al., 'Experiments with Quantitative Evaluation Tools for Monitoring Operational Security,' IEEE Transaction on Software Engineering, Vol.25, pp.633-650, 1999 https://doi.org/10.1109/32.815323
  19. C. Choi, S. Kim, and W. Choi, 'Survivality Modeling for Quantitative Security Assessment in Ubiquitous Computing Systems,' Lecture Notes in Computer Science, Springer, Vol.3043, No.1, pp.207-214, May, 2004 https://doi.org/10.1007/b98048
  20. 최창열, 김성수, '유비쿼터스 컴퓨팅의 신뢰성 모델링을 위한 정량적 분석법', 2004년 한국정보과학회 춘계학술발표대회, 한국정보과학회, 제31권 1호,pp.622-624, 2004
  21. R. Rivest, 'The MD5 Message-Digest Algorithm,' RFC 1321, Internet Engineering Task Force, 1992
  22. J. Mirkovic, G. Prier, and P. Reiher, 'Attacking DDoS at the Source,' Proceedings of the 10th IEEE Inter- national Conference on Network Protocols, pp.312-321, 2002
  23. S. Hunter and W. Smith, 'Code-Red: a Case Study on the Spread and Victims of an Internet Worm,' Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement, Analysis and Synthesis, pp.273-284, 2002 https://doi.org/10.1145/637201.637244