DOI QR코드

DOI QR Code

A Symptom based Taxonomy for Network Security

네트워크상에서의 징후를 기반으로 한 공격분류법

  • 김기윤 (성균관대학교 컴퓨터공학과) ;
  • 최형기 (성균관대학교 정보통신공학부 컴퓨터공학과) ;
  • 최동현 (성균관대학교 컴퓨터공학과) ;
  • 이병희 (성균관대학교 컴퓨터공학과) ;
  • 최윤성 (성균관대학교 컴퓨터공학과) ;
  • 방효찬 (ETRI 능동보안기술연구팀) ;
  • 나중찬 (ETRI 능동보안기술연구팀)
  • Published : 2006.08.01

Abstract

We present a symptom based taxonomy for network security. This taxonomy classifies attacks in the network using early symptoms of the attacks. Since we use the symptom it is relatively easy to access the information to classify the attack. Furthermore we are able to classify the unknown attack because the symptoms of unknown attacks are correlated with the one of known attacks. The taxonomy classifies the attack in two stages. In the first stage, the taxonomy identifies the attack in a single connection and then, combines the single connections into the aggregated connections to check if the attacks among single connections may create the distribute attack over the aggregated connections. Hence, it is possible to attain the high accuracy in identifying such complex attacks as DDoS, Worm and Bot We demonstrate the classification of the three major attacks in Internet using the proposed taxonomy.

공격 발생시에 네트워크에 나타나는 징후정보를 수집하여 공격을 분류하는 징후기반공격분류법을 제안한다. 이 공격분류법은 공격 발생시 징후를 이용하므로 필요한 정보의 수집이 빠르고 알려지지 않은 공격에 대한 분류가 가능한 장점이 있다. 제안하는 공격법은 두 단계로 공격을 분류한다. 단일 공격자로부터 단일 공격대상에게 나타나는 단일 공격들을 먼저 분류하고 단일 공격들이 서로 연관성 없는 다른 공격들인지 아니면 동일한 하나의 공격을 구성하는 연관된 공격인지 판단하게 된다. 따라서, 이미 제안된 공격분류법보다 정확하게 분산서비스거부공격이나 웜, Bot과 같은 공격을 분류할 수 있게 되었다. 제안하는 분류법을 이용하여 원과 분산서비스거부공격의 특정 및 근거리통신망에서 발생하는 공격의 특정을 도출하였고 이러한 특정들은 새로운 웜이나 분산서비스거부공격 또는 근거리통신망에서 발생하는 공격들도 공통적으로 가지는 특정임을 보였다.

Keywords

References

  1. Dean Turner et al., 'Syrnantec Internet Security Threat Report Trends for July 05 - December 05 Volume IX, March 2006,' Symantec, March, 2006
  2. John D. Howard, 'An Analysis Of Security Incidents On The Internet 1989-1995,' PhD thesis, Carnegie Mellon University, April, 1997
  3. John D. Howard and Thomas A. Longstaff, 'A Common Language for Computer Security Incidents,' Sandia Report SAND98-8667, October, 1998
  4. Tim Grance, Karen Kent and Brian Kim, 'Computer Security Incident Handling Guide,' NIST Special Publication 800-61, January, 2004
  5. James P. Anderson, 'Computer Security Threat Monitoring and Surveillance' James P. Anderson Co., Fort Washington, PA, April, 1980
  6. N. D. Jayaram and P. L. R. Morse, 'Network security: A taxonomic view,' In European Conf. Sec. and Detection, IEEE, pp.124-127, April, 1997
  7. Kevin S. Killourhy, Roy A. Maxion, and Kyrnie M. C. Tan, 'A defence-centric taxonomy based on attack manifestations,' In Proceedings of the International Conference on Dependable Systems and Networks 2004, June, 2004 https://doi.org/10.1109/DSN.2004.1311881
  8. Jeffrey Undercoffer and John Pinkston, 'Modeling Computer Attacks: A Target-Centric Onto-pogy for Intrusion Detection,' CADIP Research Symposium 2002, October, 2002
  9. Catherine Cook et al., 'An Introduction to Tivoli Enterprise,' IBM, pp. 679 - 726, October 1999, available at http://www.redbooks.ibm.com/redbooks/pdfs/ sg245494.pdf
  10. CERT, 'CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks,' CERT/CC, September, 1996, available at http://www.cert.org/advisories/CA-1996-21.html
  11. CERT, 'CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks,' CERT/CC, January 1998, available at http://www.cert.org/advisories/CA-1998-01.html
  12. Cristina Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, and Ken Rowe, 'Log Correlation for Intrusion Detection: A Proof of Concept,' Computer Security Applications Conference, December, 2003
  13. Nong Ye, Joseph Giordano and John Feldman, 'A Process Control Approach to Cyber Attack Detection,' Communications of the ACM, Vol 44 No 8, pp 76-82, August, 2001 https://doi.org/10.1145/381641.381662
  14. Akira Kanamaru, Kohei Ohta, Nei Kato, Glenn Mansfield and Yoshiaki Nemoto, 'A simple packet aggregation technique for fault detection,' International Journal of Network Management 2000, Vol. 10, Issue 4, pp.215-228, August, 2000 https://doi.org/10.1002/1099-1190(200007/08)10:4<215::AID-NEM373>3.0.CO;2-2