DOI QR코드

DOI QR Code

Design of an Intrusion Detection and Self-treatment System for IoT

사물인터넷을 위한 침입탐지 및 자가 치료 시스템의 설계

  • Oh, Sun-Jin (Dept. of Computer & Information Science, Semyung University)
  • Received : 2018.07.06
  • Accepted : 2018.10.05
  • Published : 2018.10.31

Abstract

With the advent of the 5G communication era recently, advancement of the convergence technologies related to IoT has been progressed rapidly. IoT convergence technologies using various sensors are actively applied many fields in our lives, and it contributes to the popularization of these convergence technologies among many people successfully. The security problem of the IoT which connects many things on the network is critically vulnerable and is one of the most important challenge to be solved urgently. In this paper, we design an intrusion detection and self-treatment system for IoT, which can detect external attacks and anomalies in order to solve the security problems in IoT, perform self-treatment by operating the vaccine program according to the intrusion type whenever it detects certain intrusion. Furthermore, we consider the broadcasting of intrusion alarm message according to the frequency of similar circumstances in order to block intrusion contagious in IoT.

본격 5G 통신시대의 도래와 더불어, 최근 사물인터넷과 연관된 융합기술의 발전이 급속도로 진행되고 있다. 일상생활의 여러 분야에서 다양한 센서 등을 이용한 사물인터넷 융합기술이 활발하게 응용되고 있으며, 많은 사람들 사이에서의 대중화가 성공적으로 이루어지고 있는 상황이다. 하지만, 많은 사물들이 네트워크에 연결되어 이루어지는 사물인터넷에서의 보안은 극히 취약하며 시급히 해결되어야 할 과제 중의 하나이다. 본 연구에서는 이러한 문제를 해결하기 위해 사물인터넷에 외부로 부터의 침입 또는 비정상적인 행위(anomaly)가 있는지를 실시간으로 탐지하고, 침입이 탐지되면 침입 유형에 따른 해당 치료 백신 프로그램을 가동시켜 자가 치료를 수행하도록 하는 사물 인터넷을 위한 침입탐지 및 자가 치료 시스템을 설계하고자 한다. 아울러, 사물인터넷으로의 침입 유행을 차단하기 위하여 유사 상황 빈도에 따른 침임 경고 메시지 방송 등을 고려한다.

Keywords

References

  1. H. Y. Kim, Internet of Things: Concept, Implementation Technology, and Business, Hongrung Science Pub. Co., pp. 314, 2014.
  2. D. Lake, A. Rayes, M. Morrow, "The Internet of Things", The Internet Protocol Journal, vol. 15, no. 3, September 2012.
  3. I. Jeon, S. Kang, H. Yang, "Development of Security Quality Evaluate Basis and Measurement of Intrusion Prevention System," Journal of the Korea Academia-Industrial cooperation Society (JKAIS), Vol. 11, No. 1, pp. 81-86, 2010.
  4. I. H. Bae, C. H. Kim, H. T. Noh, "Design and Evaluation of a Fuzzy Logic based Multi-hop Broadcast Algorithm for IoT Application", Journal of Internet Computing and Services, vol. 17, no. 6, pp. 17-23, 2016. doi: 10.7472/jksii.2016.17.6.17.
  5. I. H. Bae, "Design and Evaluation of an Edge-Fog Cloud-based Hierarchical Data Delivery Scheme for IoT Application", Journal of Internet Computing and Services, vol. 19, no. 1, pp. 37-47, 2018. doi: 10.7472/jksii.2018.19.1.37.
  6. C. W. Lee, IoT Vaccine, Hanbit Media Inc., pp. 300, 2017.
  7. Y. B. Kwon, I. S. Kim, "A Study on Anomaly Signal Detection and Management Model using Big Data", Journal of the Institute of Internet, Broadcasting and Communication(IIBC) vol. 16, no. 6, pp. 287-294, 2016. doi: 10.7236/jiibc.2016.16.6.287.
  8. S. I. Lee, S. C. Lee, J. R. Lee, H. Y. Youm, "Extraction of Network Threat Signatures using Latent Dirichlet Allocation", Journal of Internet Computing and Services(JICS), vol. 19, no. 1, pp. 1-10, 2018. doi: 10.7472/jksii.2018.19.1.1.
  9. S. J. Oh, "Design and Evaluation of a Weighted Intrusion Detection Method for VANETs", The Journal of the Institute of Internet and Broadcasting and Communication (IIBC), vol. 11, no. 3, pp. 181-188, June 2011.
  10. M. C. Chae, H. Lim, N. H. Kang, "Design of Multi-level Abnormal Detection System Suitable for Time-Series Data", Journal of the Institute of Internet, Broadcasting and Communication(IIBC) vol. 16, no. 6, pp. 1-7, 2016. doi: 10.7236/jiibc.2016.16.6.1.
  11. K. Y. Kwack, Social Network Analysis, 2ed. Chungram Pub., pp. 690, 2017.
  12. M. Akihiro, Google Analytics Access Kaiseki Kanzen Guide, Socym Co., pp. 239, 2014.