DOI QR코드

DOI QR Code

Trend and Prospect of Security System Technology for Network

네트워크를 위한 보안 시스템의 기술 개발 동향 및 전망

  • 양경아 (ETRI 부설 연구소 미래연구센터) ;
  • 신동우 (ETRI 부설 연구소 미래연구센터) ;
  • 김종규 (ETRI 부설 연구소 미래연구센터) ;
  • 배병철 (ETRI 부설 연구소 미래연구센터)
  • Received : 2018.09.03
  • Accepted : 2018.10.05
  • Published : 2018.10.31

Abstract

The latest cyber attack utilizing advanced technologies is more rapidly advancing than developing speed of defense technology, thereby escalates the security risk. In responding to this recent threat, academia and industries are developing some sophisticated security technologies applying various methods. Based on these technologies, security systems are used in many fields. This article aims to select noticeable network security related technologies for the security systems. In particular, we compared and analyzed the trend, performance, and functions of both foreign and domestic technologies in regard to UTM having the largest portions among network security systems so far. We will also discuss the prospect for the change in network infrastructure due to the emergence of the next-generation network technology.

최근 사이버 공격은 진보된 기술을 활용하여 방어 기술의 발전 속도보다 빠르게 고도화되고 있어 그 위험수위가 갈수록 높아지고 있다. 이에 대응하기 위해 학계는 물론 산업계에서도 다양한 방법을 적용한 보안 기술을 개발하고 있으며 이를 기반으로 한 보안 시스템들이 적용되고 있다. 본 논문에서는 세대별로 진화하는 공격들을 살펴보고 이에 대응하여 발전하는 네트워크 보안 관련 현황을 소개한다. 특히, 네트워크 보안 시스템 중 최근까지 가장 큰 비중을 차지하고 있는 UTM과 관련하여 상용 제품을 중심으로 해외 및 국내 기술의 동향과 성능 및 기능에 관한 비교 분석을 수행하였다. 또한 차세대 네트워크 기술의 등장으로 인한 네트워크 인프라 변화에 대한 향후 전망에 대해 논의하고자 한다.

Keywords

References

  1. Checkpoint, "Achieving Fifth Generation Cyber Security, A Survey Research Report of IT and Security Professionals", Mar 2018.
  2. Hee-Jae Park, Yu-Na Kim, Jong Kim, "Network Security Appliance", The Korean Institute of Information Scientists and Engineers, Vol 19, No. 2, pp. 48-58, Dec 2005.
  3. IDC, "Asia/Pacific Quarterly Security Appliance Tracker",https://www.idc.com/tracker/showproductinfo.jsp?prod_id=109
  4. Kaspersky, https://www.kaspersky.com/resource-center/definitions/utm
  5. Gartner, https://www.gartner.com/it-glossary/unified-threat-management-utm
  6. Gartner, https://www.gartner.com/it-glossary/next-generation-firewalls-ngfws
  7. IDC, "UTM and Firewall Growth Drive the Worldwide Security Appliance Market Expansion in 2016, According to IDC", Mar 2016.
  8. IDC, "UTM and Firewall Growth Drive the Worldwide Security Appliance Market Expansion in Q2 2017, According to IDC", Sep 2017.
  9. IDC, "UTM and Firewall Growth Drive the Worldwide Security Appliance Market Expansion in Q2 2018, According to IDC", Sep 2018.
  10. IDC, "Top 5 Vendors, Worldwide Security Appliance Revenue & Growth", Jun 2018.
  11. Mun-Su Choi, Min-Cheol Kim, "Korea IT Security Products Forecast, 2016-2020", IDC Report, 2016.
  12. Gartner, "Magic Quadrant for Unified Threat Management", Jun 2017.
  13. Fortinet, https://www.fortinet.com/content/dam/fortinet/assets/data-sheets/Fortinet_Product_Matrix.pdf
  14. CheckPoint 3200 Security Gateway, https://www.checkpoint.com/downloads/product-related/datasheets/ds-3200-appliance.pdf
  15. Sophos SG Series, https://www.sophos.com/en-us/medialibrary/pdfs/factsheets/sophos-sg-series-appliances-brna.pdf
  16. Cisco ASA Firepower 2100, 4100 Series, https://www.cisco.com/c/en/us/products/collateral/security/firepower-ngfw/datasheet-c78-736661.html
  17. SonicWall Network Security appliance NSa) series, https://www.sonicwall.com/SonicWall.com/files/17/177b1c66-ae9f-4448-9ebf-c829e1acf3bf.pdf
  18. Ahlab, Ahnlab TrustGuard Series, https://www.ahnlab.com/kr/site/product/productView.do?prodSeq=10
  19. SECUI, SECUI MF2, https://www.secui.com/product/mf2
  20. NexG, NexG VForce UTM Series, https://www.nexg.net/products/network-security/vforce-utm/#tab-3
  21. Wins, Wins Sniper UTM/FW Series, http://www.wins21.co.kr/product/product_030101.html?num=14
  22. Hoyoung Hwang, Seung-Cheon Kim, "Design and Implementation of Unified Network Security System support for Traffic", International Journal of Internet, Broadcasting and Communication, Vol. 11, No. 6, pp.267-273, Dec 2011.
  23. Kyung-Shin Kim, "Security Analysis and Improvement of Integrated Security Management System", International Journal of Internet, Broadcasting and Communication, Vol. 15, No. 1, pp.15-23, Feb 2015. DOI: 10.7236/JIIBC.2015.15.1.15
  24. Dae-Cheol Shin, Hong-Yoon Kim, "Implementation of abnormal behavior detection Algorithm and Optimizing the performance of Algorithm", Journal of the Korea Academia-Industrial cooperation Society, Vol. 11, No. 11, pp. 4553-4562, 2010. DOI: 10.5762/KAIS.2010.11.11.4553
  25. Hyun-Seok Kim, Dong-Gue Park, "Implementation of Abnormal Behavior Detection System based Packet Analysis for Industrial Control System Security", Journal of the Korea Academia-Industrial cooperation Society, Vol. 19, No. 4, pp. 47-56, Apr 2018. https://doi.org/10.5762/KAIS.2018.19.4.47