DOI QR코드

DOI QR Code

A Study on the Countermeasures against APT Attacks in Industrial Management Environment

산업경영환경에서 지속적 APT 공격에 대한 대응방안 연구

  • Received : 2018.05.07
  • Accepted : 2018.06.15
  • Published : 2018.06.30

Abstract

An APT attack is a new hacking technique that continuously attacks specific targets and is called an APT attack in which a hacker exploits various security threats to continually attack a company or organization's network. Protect employees in a specific organization and access their internal servers or databases until they acquire significant assets of the company or organization, such as personal information leaks or critical data breaches. Also, APT attacks are not attacked at once, and it is difficult to detect hacking over the years. This white paper examines ongoing APT attacks and identifies, educates, and proposes measures to build a security management system, from the executives of each organization to the general staff. It also provides security updates and up-to-date antivirus software to prevent malicious code from infiltrating your company or organization, which can exploit vulnerabilities in your organization that could infect malicious code. And provides an environment to respond to APT attacks.

APT공격은 특정 목표를 두고, 지속적으로 공격하는 신종 해킹기법으로 해커가 다양한 보안위협을 악용해 특정 기업이나 조직의 네트워크에 지속해서 공격하는 것을 APT 공격이라고 한다. 특정 조직 내부 직원의 PC를 장악한 후, 내부 서버나 데이터베이스에 접근하여 개인정보 유출 사고나 중요자료 유출과 같이 기업이나 기관 내 중요 자산 탈취에 성공할 때까지 공격하는 것이 특징이다. 또한, APT 공격은 한순간에 공격이 이루어지지 않고 있으며, 수년에 거쳐 이루어지므로 해킹 감지가 어렵다. 본 논문에서는 지속적인 APT 공격에 대해 고찰하고, 대응방안을 제시하여 각 조직에 근무하는 경영진부터 일반 직원까지 보안 필요성을 인식하고 교육하고 보안 관리체계를 구축을 목표로 한다. 또한, 보안 업데이트, 최신 백신을 설치하여 악성코드 침투를 예방하는 방법을 제시하여 기업이나 조직은 항상 해킹당할 수 있다는 인식을 심어주어 조직 내에 근무하는 사람들은 악성 코드가 침투할 수 있는 취약점을 설명하고, APT공격에 대응할 수 있는 환경을 제시한다.

Keywords

References

  1. Best Practices for Big Data Analytics. (2015). Big Data Analytics, 93-109
  2. Hong, S. (2013). The Counter Attack for Physical Attacks on Wireless Sensor Networks by Secure and Optimized Group Diffie-Hellman. International Journal of Advancements in Computing Technology, 5(11), 227-232 https://doi.org/10.4156/ijact.vol5.issue11.24
  3. M.G.Lee, C.S.Bae. (2013). A Study on the Major Cases of APT Attack. Korea Electronic Engineering Association conference, 939-942.
  4. Hong, S. (2015). Two-channel user authentication by using USB on Cloud. Journal of Computer Virology and Hacking Techniques, 12(3), 137-143
  5. Mun, H., Hong, S., & Shin, J. (2017). A novel secure and efficient hash function with extra padding against rainbow table attacks. Cluster Computing, 21(1), 1161-1173 https://doi.org/10.1007/s10586-017-0886-4
  6. S.H.Ji, H.G.Kim. (2012). A Study on the Effective Detection of Malicious Codes through Automatic Decoding of obfuscated JavaScript Journal of the Society for Information Protection, 22(4), 869-882.
  7. M.C.Lee, D.S.Moon, I.G.Kim. (2015). Fast data-based real-time abnormal behavior detection system. Journal of the Society for Information Protection, 25(5), 1027-1041.
  8. J.Kim. (2017). IP Spoofing Detection detection to enhance endpoint security. Journal of the Information Technology Association of Korea, 15(8), 75-83. https://doi.org/10.14801/jkiit.2017.15.8.75
  9. J.W.Chei, Y.J.Lee, J.M.Park. (2012). E-DRM-based privacy technologies to overcome DLP-enabled problems. Journal of the Society for Information Protection, 22(5), 1103-1113.
  10. Y.J.Song, J.M.Do. (2010). Proxy-based access to medical data. A Study on the Internet e-commerce, 10(3), 235-248.
  11. Hong, S. (2013). The Counter Attack for Physical Attacks on Wireless Sensor Networks by Secure and Optimized Group Diffie-Hellman. International. Journal of Advancements in Computing Technology, 5(11), 227-232 https://doi.org/10.4156/ijact.vol5.issue11.24
  12. Kilroy, R. J. (2011). "Obamas Wars," Bob Woodward, (New York, NY: Simon and Schuster, 2010). Journal of Strategic Security, 4(2), 121-123. https://doi.org/10.5038/1944-0472.4.2.9
  13. Hong, S., Lim, S., & Song, J. (2011). Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey. KSII Transactions on Internet and Information Systems, 805-821
  14. Fang, X., Zhai, L., Jia, Z., & Bai, W. (2014). A Game Model for Predicting the Attack Path of APT. 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing
  15. Galatas, I. (2008). Medical Countermeasures Following Terrorism CBRNE Attack in Urban Environment. In Resilience of Cities to Terrorist and other Threats (pp. 401-415). Springer, Dordrecht.