DOI QR코드

DOI QR Code

데이터베이스에서 지정된 IP 주소 접근 금지를 위한 기능 설계

Design of the Specific IP Access Deny for the Database

  • Jang, Seung-Ju (Dongeui University Department of Computer Engineering) ;
  • Kim, Sung-Jin (Dongeui University Department of Computer Engineering)
  • 투고 : 2014.05.20
  • 심사 : 2014.08.01
  • 발행 : 2014.08.31

초록

본 논문은 Oracle 데이터베이스의 환경과 C 프로그램 환경에서 원격으로 IP 주소를 사용하여 해킹 등의 보안 취약점을 공격하는 것을 예방하고, 문제점을 해결한다. 공격자가 원격으로 IP 주소를 사용하여 데이터베이스 로그인을 시도하여 데이터를 해킹 하는 경우가 많다. 최근에는 해외의 IP 주소를 사용하여 로그인 하는 경우도 자주 발생하고 있으며, 노출된 데이터베이스 계정을 이용하여 로그인을 시도하고 있어, 데이터베이스의 데이터 노출 위협이 높아지고 있다. 본 논문은 Oracle 데이터베이스의 특정 IP 차단 모듈을 개발하여 특정 IP를 차단 혹은 제어함으로써 악의적인 사용자가 데이터베이스에 접근할 수 없도록 한다.

This paper proposes how to prevent of vulnerability from IP address attack of Oracle DB by C program environments. An attacker may try to login DB by connectng remote IP address. Recently an attacker use foreign IP address and try to connect to DB using known DB account. Therefore, DB data is frequently disclosed. I propose a new idea that develops specific IP address blocking module in C program in the Oracle DB. By this module, we can use the Oracle DB safely.

키워드

참고문헌

  1. J. S. Kim, DB security for the protection of personal information(2006), Retrieved Dec., 10, 2013, from http://blog.naver.com/mybrainz/150007657976
  2. Wikipedia vulnerability(2012), Retrieved Dec. 12, 2013, from http://ko.wikipedia.org/
  3. DB Vulnerability Analysis Summary, Retrieved Dec. 20, 2013, from www.DBGuide.net
  4. Listener(2009), Retrieved Dec., 2, 2013, from http://www.netbuysell.co.kr/global_asp/board/board_view.asp?Codeno=5&K_no=359&Pgtype=A
  5. S. H. Lee, Y. J. Maeng, D. H. Nyang, and K. H. Lee, "Possibility of disclosure of user information in internet explorer," J. KICS, vol. 38B, no. 12, pp. 937-943, 2013. https://doi.org/10.7840/kics.2013.38B.12.937
  6. J. H. Lee, J. S. Park, S. W. Jung, and S. Jung, "The authentication and key management method based on PUF for secure USB," J. KICS, vol. 38B, no. 12, pp. 944-953, 2013. https://doi.org/10.7840/kics.2013.38B.12.944
  7. W. S. Seo and M. S. Jun "The management and security plans of a separated virtualization infringement type learning database using VM (virtual machine)," J. KICS, vol. 36, no. 8, pp. 947-953, 2011. https://doi.org/10.7840/KICS.2011.36B.8.947
  8. P.-H. Jo, J.-I. Lim, and H.-K. Kim "A study on improvement of security vulnerabilities in intelligent transport system," J. The Korea Inst. Inf. Security & Cryptology(JKIISC), vol. 23, no. 3, pp. 531-543, 2013. https://doi.org/10.13089/JKIISC.2013.23.3.531
  9. D.-J. Kim and S.-J. Cho "An analysis of domestic and foreign security vulnerability management systems based on a national vulnerability database," Internet lnf. Security, vol. 1, no. 2, pp. 130- 147, 2010.
  10. I.-Y. Mun and S.-M. Oh "Vulnerability analyzers for the mobile application the design and implementation," J. Korea Multimedia Soc., vol. 14, no. 10, pp. 1335-1347, Oct. 2011. https://doi.org/10.9717/kmms.2011.14.10.1335
  11. S.-M. Yang and J. S. Park "An efficient access control mechanism for secure surveillance systems," J. KICS, vol. 39B, no. 4, pp. 228-233, 2014. https://doi.org/10.7840/kics.2014.39B.4.228
  12. J.-S. Park, M.-H. Park, and S.-H. Jung "A whitelist-based scheme for detecting and preventing unauthorized AP access using mobile device," J. KICS, vol. 38B, no. 8, pp. 632-640, 2013. https://doi.org/10.7840/kics.2013.38B.8.632
  13. H.-U. Yoo, J.-H. Yun, and T.-S. Shon "Whitelist-based anomaly detection for industrial control system security," J. KICS, vol. 38B, no. 8, pp. 641-653, 2013. https://doi.org/10.7840/kics.2013.38B.8.641
  14. Y.-H. Lee, J. H. Kang, and S. J. Lee "A specification-based intrusion detection mechanism for LEACH protocol," J. KICS, vol. 37B, no. 2, pp. 138-147, 2012. https://doi.org/10.7840/KICS.2012.37B.2.138