Browse > Article
http://dx.doi.org/10.13089/JKIISC.2021.31.6.1181

A Method of Device Validation Using SVDD-Based Anormaly Detection Technology in SDP Environment  

Lee, Heewoong (Kongju National University)
Hong, Dowon (Kongju National University)
Nam, Kihyo (UMLogics Co., Ltd.)
Abstract
The pandemic has rapidly developed a non-face-to-face environment. However, the sudden transition to a non-face-to-face environment has led to new security issues in various areas. One of the new security issues is the security threat of insiders, and the zero trust security model is drawing attention again as a technology to defend against it.. Software Defined Perimeter (SDP) technology consists of various security factors, of which device validation is a technology that can realize zerotrust by monitoring insider usage behavior. But the current SDP specification does not provide a technology that can perform device validation.. Therefore, this paper proposes a device validation technology using SVDD-based abnormal behavior detection technology through user behavior monitoring in an SDP environment and presents a way to perform the device validation technology in the SDP environment by conducting performance evaluation.
Keywords
ZeroTrust; Non-face-to-face Environment; Software Defined Perimeter; SVDD; Device Validtaion;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Minsoo Park, Jumin Park, Hyungheon Kim and Yoojae Won, "User Identification Method Using Input Pattern Analysis", The Korean Society Of Computer And Information Conference, 25(1), pp. 213-216, Jan. 2017.
2 de Vet, J.M, et al. "Impacts of the COVID19 pandemic on EU industries" Publication for the committee on Industry, Research and Energy, Policy Department for Economic, Scientific and Quality of Life Policies, European Parliament, Luxembourg, Mar. 2021.
3 Scoot Rose, Oliver Borchert, Stu Mitchel and Sean Connelly, "Zero Trust Architecture", NIST SP 800-207, Aug. 2020.
4 Wikipedia, "Software Defined Perimeter", https://en.wikipedia.org/wiki/Software_Defined_Perimeter, May 2021
5 Jason Garbis and Juanita Koilpillai, "Software-Defined Perimeter ARCHITECTURE GUIDE," Cloud Security Alliance, Jul. 2019.
6 Abdallah Moubayed, Ahmed Refaey and Abdallah Shami, "Software- Defined Perimeter(SDP): State of the Art Secure Solution for Modern Networks," IEEE Network, 33(5), pp. 226-233, Sep. 2019.   DOI
7 T. David and D. Robert, "Support vector data description", Machine Learning, vol.54, nol.1, pp. 45-66, Jan. 2004.   DOI
8 BrentBilger, Alan Boehme, Bob Flores, Zvi Guterman, Mark Hoover, Michaela lorga, Junaid Islam, Marc Kolenko, Juanita Koilpilla, Gabor Lengyel, Gram Ludlow, Ted Schroeder and Jeff Schweitzer, "SDP_Specification 1.0," Cloud Security Alliance, Apr. 2014.
9 Dong-Hyun Yu, Yong-Uk Kim, Young-Jae Ha and Yeon-Seung Ryu, "Consideration of New Convergence Security Threats and Countermeasures in the Zero-Contact Era" Jonornal of The Korea Conergence Society, vol. 12, No.1, pp. 1-9, Jan. 2012.
10 John Kidervag, "No More Chewy Centers: Introducing The Zero Trust Model Of Information Security," FORRESTER, Sep. 2010.
11 Mun-Kweon Jeong, Seong-Ho An and Kihyo Nam, "SVDD-Based Fianacial Fraud Detection MethodThrough Respective Learnings of Normal/Abnormal Behaviors," International Journal of Security and Its Applications, vol.10, No.3, pp. 429-436, Mar. 2016.   DOI
12 Kyeong-Jin Sa, Jae-Yeon Woo and Heung-Youl Youm, "Behavior-based biometric authentication available for multi-factor authentication", KIISC review, 26(6), pp. 51-57, Dec. 2016
13 J. H. Park, "Effective Normalization Method for Fraud Detection Using a Decision Tree", Jounal of the Korea Institute of Information Security & Cryptology, vol. 25, no. 1, pp. 133-146, Feb. 2015.   DOI