• Title/Summary/Keyword: 공격탐지시스템

Search Result 818, Processing Time 0.026 seconds

정보유출방지와 프라이버시 침해에 대한 고찰

  • Kim, Jin-Hyung;Kim, Hyung-Jong
    • Review of KIISC
    • /
    • v.21 no.5
    • /
    • pp.45-49
    • /
    • 2011
  • 네트워크 등의 환경에서 정보의 사용 범위가 확대됨에 따라 PC 및 다기능의 단말 등을 사용하여 내부 정보에 접근 가능하도록 하는 기능적 요구가 확대되고 있다. 그러나 이러한 요구에 따라 내부 정보 접근이 용이 해 지면서 내부 정보 유출의 가능성이 증가 하게 되었다. 실제로 최근 발생한 정보유출 사건들은 단순 정보유출이나 일회성 공격에 지나지 않고, 자산의 유출로 인해 기업의 존폐를 흔들 만큼 그 영향이 커지고 있다. 이러한 정보유출사고 발생이 증가함에 따라 정보를 취급하는 정부기관 및 기업은 이를 막기 위하여 정보유출방지시스템을 운영한다. 그러나 정보유출을 방지하기 위한 솔루션이 확인 하는 데이터에는 정보유출방지시스템에 연결되어있는 사용자들의 개인정보가 포함되어있다. 개인의 프라이버시는 어떠한 경우에서도 반드시 보호되어야 한다는 관점으로 볼 때, 정보유출탐지시스템 설계 시 사용자들의 프라이버시 보호가 가능한 솔루션이 필요한 상황이라고 볼 수 있다. 본고에서는 정보유출 방지를 위한 기술이 갖는 프라이버시 침해 관계에 대해 살펴보고, 이를 막기 위한 요소기술들을 제시하고자 한다. 본고는 정보유출과 개인정보보호에 대한 상관관계 분석에 대한 연구 내용을 요약하는 형태로 작성되었다.

스피어 피싱 대응을 위한 엔드포인트 에이전트 시스템 모델에 관한 연구

  • Kim, Chang-Hong;Kim, Sang-Pil;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.712-714
    • /
    • 2015
  • 기존의 정보보호시스템들은 이미 확보된 시그니처 또는 이전에 분석된 정보를 기반으로 악성코드에 대응하고 있기 때문에, 시그니처가 알려지지 않은 악성코드 또는 변형된 악성코드의 경우, 탐지 및 식별에 한계를 지니고 있다. 본 연구는 이와 같은 문제를 해결하기 위해, 무결성을 검증하는 화이트리스트 기반의 응용프로그램 실행제어, 매체제어, 레지스트리 보호, 중요 파일 변경 방지, 프로세스 접근 역접속 IP/포트 통제 등의 기술을 복합적으로 적용하여, 악성코드의 침입뿐만 아니라 운영체제 및 응용프로그램 취약점을 기반으로 한 익스플로잇 공격으로부터 단말 PC를 더욱 확실하게 보호할 수 있도록 한 엔드포인트 응용프로그램 실행 통제 방안을 제시하였다. 본 연구의 결과는 프로토타입 형태로 개발하여 실 환경에서 통합테스트를 하여 공공기관, 금융기관, 통신사 등 실제 환경에 적합한 기술 및 기능임을 확인하였다. 본 연구를 통해, 실행 전 응용프로그램 무결성 검증과 실행 후 응용프로그램 실행 흐름 통제를 복합적으로 사용하여 알려진 악성코드 시그니처 정보에 의존한 기존 정보 보호 시스템과는 달리 알려지지 않은 악성코드까지 원천적으로 차단할 수 있을 것으로 기대된다.

  • PDF

Design and Implementation of Batch Security Policy Management System (일괄 보안정책 관리 시스템의 설계 및 구현)

  • Kim Yi-Gon;Shin Young-Sun;Yu Sung-Hun;An So-Jin;Park Jin-Sub
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.262-264
    • /
    • 2006
  • 오늘날 빠른 정보화로 인한 역기능의 발생으로 인하여 침입탐지, 침입차단 및 방지 시스템들의 다양한 보안 솔루션을 도입하여 사용하고 있다. 하지만 제로 데이 공격과 같이 빠르게 확산될 경우 보안 장비에 빠르게 정책을 적용해야 하지만 보안 장비마다 각기 다른 접근 및 제어 형식으로 인하여 빠르게 대처하고 있지 못하다. 본 논문에서는 이러한 문제점을 보완하기 위해 한번의 정책 주입으로 대규모 네트워크에 설치되어 있는 보안 장비 및 네트워크 장비에 보안정책을 주입 시킬 수 있는 일괄 보안정책 관리 시스템에 대한 설계 및 구현에 대하여 논하고자 한다.

  • PDF

Modeling and Implementation of IDS for Security System simulation using SSFNet (SSFNet 환경에서 보안시스템 시뮬레이션을 위한 IDS 모델링 및 구현)

  • Kim, Yong-Tak;Kwon, Oh-Jun;Seo, Dong-Il;Kim, Tai-Suk
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.1
    • /
    • pp.87-95
    • /
    • 2006
  • We need to check into when a security system is newly developed, we against cyber attack which is expected in real network. However it is impossible to check it under the environment of a large-scale distributive network. So it is need to simulate it under the virtual network environment. SSFNet is a event-driven simulator which can be represent a large-scale network. Unfortunately, it doesn't have the module to simulate security functions. In this paper, we added the IDS module to SSFNet. We implement the IDS module by modeling a key functions of Snort. In addition, we developed some useful functions using Java language which can manipulate easily a packet for network simulation. Finally, we performed the simulation to verify the function if our developed IDS and Packets Manipulation. The simulation shows that our expanded SSFNet can be used to further large-scale security system simulator.

  • PDF

A Development of Web-based Integrated Security Management System for Firewalls (웹 기반의 방화벽 통합 보안 관리 시스템 개발)

  • Lee, Dong-Young;Kim, Dong-Soo;Hong, Seung-Sun;Chung, Tai-Myoung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3171-3181
    • /
    • 2000
  • With a remarkable growth and expansionof Internet, the security issues emerged from intrusions and attacks such as computer viruses, dental of servives and backings to destroy intormation have been considered as serious threats for Internet and the provate networks. To protect networks from those attacks, many nendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However managing those systems individually requres too much work and high cost. Thus, integrated security managemanet and eatabliashment of consistent security policy for various security products has become more important. In this paper, we propose integrated security manabement system called WISMSF(Web based Integrated Security Management System for Fireswalls) to monitor and contro various kinds of firewalls WISMSF consists of three components-clients, integrated engine, and agents. It supports the transparent management functions of security products, easy ways of defining security policies, and simple expansion of managed ranges.

  • PDF

A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구)

  • Lee, Dong-Yeong;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.607-614
    • /
    • 2001
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from those attacks, many vendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However, managing those systems individually requires too much work and high cost. Thus, in order to manage integrated security management and establish consistent security management for various security products, the policy model of PN-ISMS (Policy Based Integrated Security Management System) has become very important. In this paper, present the hierarchical policy model which explore the refinement of high-level/conceptual policies into a number of more specific policies to form a policy hierarchy. A formal method of policy description was used as the basis of the mode in order to achieve precision and generality. Z-Notation was chosen for this propose. The Z-Notation is mathematical notation for expressing and communicating the specifications of computer programs. Z uses conventional notations of logic and set theory organized into expressions called schemas.

  • PDF

A study on Prevention of Large Scale Identity Theft through the Analysis of Login Pattern(Focusing on IP/Account Blocking System in Online Games) (로그인 패턴 분석을 통한 대규모 계정도용 차단 방안에 관한 연구(온라인 게임 IP/계정 차단시스템을 중심으로))

  • Yeon, Soo-Kwon;Yoo, Jin-Ho
    • Journal of Korea Game Society
    • /
    • v.16 no.2
    • /
    • pp.51-60
    • /
    • 2016
  • The incidents of massive personal information being leaked are occurring continuously over recent years. Personal information leaked outside is used for an illegal use of other's name and account theft. Especially it is happening on online games whose virtual goods, online game money and game items can be exchanged with real cash. When we research the real identity theft cases that happened in an online game, we can see that they happen massively in a short time. In this study, we define the characteristics of the mass attacks of the automated identity theft cases that occur in online games. Also we suggest a system to detect and prevent identity theft attacks in real time.

A DDMPF(Distributed Data Management Protocol using FAT) Design of Self-organized Storage for Negotiation among a Client and Servers based on Clouding (클라우딩 기반에서 클라이언트와 서버간 협상을 위한 자가 조직 저장매체의 DDMPF(Distributed Data Management Protocol using FAT) 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee;Yang, Seung-Hae
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1048-1058
    • /
    • 2012
  • This paper proposes the DDMPF(Distributed Data Management Protocol using FAT) which prevents data loss and keeps the security of self-organized storages by comprising a client, a storage server, and a verification server in clouding environment. The DDMPF builds a self-organized storage server, solves data loss by decentralizing the partitioned data in it in contrast to the centralized problem and the data loss caused by the storage server problems of existing clouding storages, and improves the efficiency of distributed data management with FAT(File Allocation Table). And, the DDMPF improves the reliability of data by a verification server's verifying the data integrity of a storage server, and strengthens the security in double encryption with a client's private key and the system's master key using EC-DH algorithm. Additionally, the DDMPF limits the number of verification servers and detects the flooding attack by setting the TS(Time Stamp) for a verification request message and the replay attack by using the nonce value generated newly, whenever the verification is requested.

Services analysis and improvement of MKE(Ministry of Knowledge Economy) Cyber Security Center (지식경제사이버안전센터의 대응활동분석과 개선방안)

  • Lee, Seung-Won;Roh, Young-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.249-258
    • /
    • 2012
  • Cyber attacks expose sensitive information and cause fatal damage in both the public and the private sectors. Therefore, MKE (Ministry of Knowledge Economy) Cyber Security Center was founded on July 25, 2008, to perform three major roles. First, it detects and analyzes cyber attacks for the both sectors. Second, its ISAC (Information Sharing & Analysis Center) service analyzes and evaluates the vulnerability of the communication and network infrastructure to security threats, including control systems. Third, it provides CERT/CC (Computer Emergency Response Team Coordination Center) service to prevent and to respond to computer security incidents. This study focuses on the MKE Cyber Security Center's service analysis, which is playing an increasingly larger role in the both sectors. Based on this analysis, after grasping the response services activity and pointing out the problems, this study suggests improvements to the MKE Cyber Security Center.

Analysis of Memory Pool Jacquard Similarity between Bitcoin and Ethereum in the Same Environment (동일한 환경에서 구성된 비트코인과 이더리움의 메모리 풀 자카드 유사도 분석)

  • Maeng, SooHoon;Shin, Hye-yeong;Kim, Daeyong;Ju, Hongtaek
    • KNOM Review
    • /
    • v.22 no.3
    • /
    • pp.20-24
    • /
    • 2019
  • Blockchain is a distributed ledger-based technology where all nodes participating in the blockchain network are connected to the P2P network. When a transaction is created in the blockchain network, the transaction is propagated and validated by the blockchain nodes. The verified transaction is sent to peers connected to each node through P2P network, and the peers keep the transaction in the memory pool. Due to the nature of P2P networks, the number and type of transactions delivered by a blockchain node is different for each node. As a result, all nodes do not have the same memory pool. Research is needed to solve problems such as attack detection. In this paper, we analyze transactions in the memory pool before solving problems such as transaction fee manipulation, double payment problem, and DDos attack detection. Therefore, this study collects transactions stored in each node memory pool of Bitcoin and Ethereum, a cryptocurrency system based on blockchain technology, and analyzes how much common transactions they have using jacquard similarity.