DOI QR코드

DOI QR Code

안전한 XaaS 구현을 위한 APT 공격 분석과 대응방안에 관한 연구

Study on APT Penetration Analysis and Plan of Reaction for Secure XaaS

  • Lee, Sun Ho (Suwon University Department of Information Security) ;
  • Kim, DaeYoub (Suwon University Department of Information Security)
  • 투고 : 2015.03.23
  • 심사 : 2015.05.08
  • 발행 : 2015.05.31

초록

XaaS(Everything as a Service)는 사용자가 필요한 소프트웨어 컴포넌트를 네트워크를 통하여 제공하고, 사용자는 자신이 이용한 컴포넌트에 따라 과금을 지불하는 서비스이다. 일반적으로 XaaS는 클라우드 컴퓨팅의 일종으로 간주된다. 그러나 XaaS는 일반적으로 중앙의 서비스 사업자에 의하여 제공되기 때문에 다양한 해킹 공격의 목표가 되기 쉽다. 특히, XaaS가 APT (Advanced Persistent Threat) 공격의 목표가 된다면, XaaS 서비스 사업자뿐만 아니라 사용자들까지 심각한 위험에 노출될 수 있다. 현재 다양한 APT 공격 대응 방안이 제안되고 있으나, 보안 통제 측면에서 모든 요소를 고려하고 있지 못하다. 본 논문에서는 안전한 XaaS 운영을 위한 기술적, 정책적 요소를 고려한 보안 감사 방안을 제안한다.

XaaS (Everything as a Service) provides re-usable, fine-grained software components like software, platform, infra across a network. Then users usually pay a fee to get access to the software components. It is a subset of cloud computing. Since XaaS is provided by centralized service providers, it can be a target of various security attacks. Specially, if XaaS becomes the target of APT (Advanced Persistent Threat) attack, many users utilizing XaaS as well as XaaS system can be exposed to serious danger. So various solutions against APT attack are proposed. However, they do not consider all aspects of security control, synthetically. In this paper, we propose overall security checkup considering technical aspect and policy aspect to securely operate XaaS.

키워드

참고문헌

  1. J.-H. Sim, J.-K. Jung, H.-J. Kim, I.-K. Kim, and T.-M. Chung, "Survey on the recent advanced persistent threat solutions," in Proc. KICS Conf., pp. 769-770, Nov. 2013.
  2. T. Mustafa, "Malicious data leak prevention and purposeful evasion attacks: An approach to advanced persistent threat (APT) management," in SIECPC, pp. 27-30, Apr. 2013.
  3. Y.-H. Kim and W. H. Park, "A study on cyber threat prediction based on intrusion detection event for APT attack detection," Multimedia Tools and Applications, vol. 71, no. 2, pp. 685-698, Jul. 2014. https://doi.org/10.1007/s11042-012-1275-x
  4. Russel Miller, "Advanced persistent threats: Defending from the inside out," CATechnologies, Jul. 2012.
  5. S.-C. Goh, A study of APTs(advanced persistent threat) penetration detect for security operation data and big data, National Security Research Institute, vol. 2014, no. 022, Oct. 2014.
  6. S.-H. Lee and M.-S. Han, Study of defense method through APT(Advanced Persistent Threat) penetration path analysis in Industrial Network-Focusing on Stuxnet Case-, Korean Association for Industrial Security, Dec. 2014.
  7. K.-H. Kim and M.-J. Choi, "Linear SVM-based android malware detection and feature selection for performance improvement," J. KICS, vol. 39C, no. 8, pp. 738-745, 2014. https://doi.org/10.7840/kics.2014.39C.8.738
  8. M. Kim, "Security analysis and enhancement of tsai et al.'s smart-card based authentication scheme," J. KICS, vol. 39B no. 1, pp. 29-37 2014. https://doi.org/10.7840/kics.2014.39B.1.29
  9. J. Lee, J. Park, S. W. Jung, and S. Jung, "The authentication and key management method based on PUF for secure USB," J. KICS, vol. 38B no. 12, pp. 944-953, 2014.