• 제목/요약/키워드: Intrusion Prevention System

검색결과 108건 처리시간 0.022초

SVM을 이용한 침입방지시스템 오경보 최소화 기법 (False Alarm Minimization Technology using SVM in Intrusion Prevention System)

  • 김길한;이형우
    • 인터넷정보학회논문지
    • /
    • 제7권3호
    • /
    • pp.119-132
    • /
    • 2006
  • 지금까지 잘 알려진 네트워크 기반 보안 기법들은 공격에 수동적이고 우회한 공격이 가능하다는 취약점을 가지고 있어 인라인(in_line) 모드의 공격에 능동적 대응이 가능한 오용탐지 기반의 침입방지시스템의 출현이 불가피하다. 하지만 오용탐지 기반의 침입방지시스템은 탐지 규칙에 비례하여 과도한 오경보(False Alarm)를 발생시켜 정상적인 네트워크 흐름을 방해하는 잘못된 대응으로 이어질 수 있어 기존 침입탐지시스템보다 더 위험한 문제점을 갖고 있으며, 새로운 변형 공격에 대한 탐지가 미흡하다는 단점이 있다. 본 논문에서는 이러한 문제를 보완하기 위해 오용탐지 기반의 침입방지시스템과 Anomaly System 중의 하나인 서포트 벡터 머신(Support Vector Machines; 이하 SVM)을 이용한 침입방지시스템 기술을 제안한다. 침입 방지시스템의 탐지 패턴을 SVM을 이용하여 진성경보만을 처리하는 기법으로 실험결과 기존 침입방지시스템과 비교하여, 약 20% 개선된 성능결과를 보였으며, 제안한 침입방지시스템 기법을 통하여 오탐지를 최소화하고 새로운 변종 공격에 대해서도 효과적으로 탐지 가능함을 보였다.

  • PDF

침입방지시스템의 보안성 품질 평가기준 및 측정체계의 개발 (Development of Security Quality Evaluate Basis and Measurement of Intrusion Prevention System)

  • 전인오;강상원;양해술
    • 한국산학기술학회논문지
    • /
    • 제11권4호
    • /
    • pp.1449-1457
    • /
    • 2010
  • 침입방지시스템 솔루션은 차세대에 각광받는 보안시스템으로 국내 외 시장에서 매우 활발한 보안 분야 시장을 형성할 것으로 전망된다. 아울러 국제 시장에 진출하고자 하는 국내 업체들은 검증된 제품임을 증명하는 품질 평가를 요구하고 있으며, 일반 사용자들도 검증된 제품을 선호하고 있다. 본 연구에서는 침입방지시스템 솔루션이 갖추어야할 보안성 품질평가 항목을 도출하여 분석을 통해서 품질평가항목을 세분화하고 침입방지시스템에 대한 보안성 품질평가 모델을 구축하였다. 도출된 품질평가 모델은 침입방지 시스템의 품질을 평가하고 향상시키는데 중요한 역할을 하게 된다.

Science DMZ 적용을 위한 SDN 기반의 네트워크 침입 방지 시스템 (SDN-Based Intrusion Prevention System for Science DMZ)

  • 조진용;장희진;이경민;공정욱
    • 한국통신학회논문지
    • /
    • 제40권6호
    • /
    • pp.1070-1080
    • /
    • 2015
  • 본 논문은 Science DMZ(Demilitarized Zone) 적용을 위한 SDN(Software Defined Networking) 기반의 네트워크 침입 방지 시스템을 소개한다. 제안된 시스템은 침입 탐지 기능을 침입 방지 장치로부터 분리하고 SDN 기술을 확장해 탐지 기능과 방어 기능을 상호 연동시킴으로써 네트워크 보안 장비의 유연성(flexibility)과 확장성(extensibility)을 높이고 패킷 검사(packet inspection) 등으로 야기되는 패킷 손실을 방지하는데 목적이 있다. 본 논문에서는 제안한 프레임워크의 한 응용 시나리오를 소개하고 국가과학기술연구망에 구축된 네트워킹 DMZ환경에 시험 적용함으로써 활용 가능성을 검증한다.

A Study on Security Event Detection in ESM Using Big Data and Deep Learning

  • Lee, Hye-Min;Lee, Sang-Joon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권3호
    • /
    • pp.42-49
    • /
    • 2021
  • As cyber attacks become more intelligent, there is difficulty in detecting advanced attacks in various fields such as industry, defense, and medical care. IPS (Intrusion Prevention System), etc., but the need for centralized integrated management of each security system is increasing. In this paper, we collect big data for intrusion detection and build an intrusion detection platform using deep learning and CNN (Convolutional Neural Networks). In this paper, we design an intelligent big data platform that collects data by observing and analyzing user visit logs and linking with big data. We want to collect big data for intrusion detection and build an intrusion detection platform based on CNN model. In this study, we evaluated the performance of the Intrusion Detection System (IDS) using the KDD99 dataset developed by DARPA in 1998, and the actual attack categories were tested with KDD99's DoS, U2R, and R2L using four probing methods.

CPN 기반의 침입방지시스템 보안모델의 안정성 검증 (Secured Verification of Intrusion Prevention System Security Model Based on CPNs)

  • 이문구
    • 전자공학회논문지CI
    • /
    • 제48권3호
    • /
    • pp.76-81
    • /
    • 2011
  • 침입방지시스템은 내부 시스템 보안 또는 외부 공격의 문제를 해결하기 위한 중요한 솔루션이다. 이러한 침입방지시스템을 도입 시 가장 우선적으로 고려해야 될 사항으로는 다양한 기능보다 안정성이다. 본 논문은 침입방지시스템 보안모델의 사용자 인증기능에 대한 안정성 검증을 위하여 칼라 페트리 네트를 이용하였다. CPN은 분산되어있고, 동시 발생적이며, 결정적 또는 동기화 방식의 비결정적인 시스템들에 대하여 그래픽적인 모델링 언어로 표현이 가능하다. 이런 칼라 페트리 네트는 각 처리 단계에 대하여 모든 가능한 상태와 발생 그래프로 표현된다. 침입방지시스템 보안 모델의 안정성은 칼라 페트리 네트를 이용한 모든 상태표현과 발생그래프의 분석결과가 무한반복 혹은 교착상태가 없으므로 검증되었다.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권6호
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

A Survey on Intrusion-Tolerant System

  • Heo, Seondong;Kim, Pyeong;Shin, Yongjoo;Lim, Jungmin;Koo, Dongyoung;Kim, Yonggon;Kwon, Ohmin;Yoon, Hyunsoo
    • Journal of Computing Science and Engineering
    • /
    • 제7권4호
    • /
    • pp.242-250
    • /
    • 2013
  • Many information systems that provide useful services to people are connected to the Internet for convenience and efficiency. However, improper accessibility might make the systems susceptible to a variety of attacks. Although existing security solutions such as an intrusion detection system, intrusion prevention system, and firewalls have been designed to protect against such attacks, it is impossible to block all kinds of attacks. Furthermore, most of the proposed solutions require information about attacks for efficient prevention. Research on intrusion-tolerant systems (ITSs) have been conducted in order to continue providing proper services in threatening environments. The purpose of an ITS is to survive against every intrusion, rather than to prevent them. In this paper, previous studies on ITS are introduced and classified according to the centric scheme as middleware-based ITS, hardware-based ITS, and recovery-based ITS. Recent research focusing on adaptive transformation schemes is also introduced.

Privacy Inferences and Performance Analysis of Open Source IPS/IDS to Secure IoT-Based WBAN

  • Amjad, Ali;Maruf, Pasha;Rabbiah, Zaheer;Faiz, Jillani;Urooj, Pasha
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.1-12
    • /
    • 2022
  • Besides unexpected growth perceived by IoT's, the variety and volume of threats have increased tremendously, making it a necessity to introduce intrusion detections systems for prevention and detection of such threats. But Intrusion Detection and Prevention System (IDPS) inside the IoT network yet introduces some unique challenges due to their unique characteristics, such as privacy inference, performance, and detection rate and their frequency in the dynamic networks. Our research is focused on the privacy inferences of existing intrusion prevention and detection system approaches. We also tackle the problem of providing unified a solution to implement the open-source IDPS in the IoT architecture for assessing the performance of IDS by calculating; usage consumption and detection rate. The proposed scheme is considered to help implement the human health monitoring system in IoT networks

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • 제13권5호
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

MANET에서 규칙을 기반으로 한 계층형 침입 탐지에 관한 연구 (The Study of Hierarchical Intrusion Detection Based on Rules for MANET)

  • 정혜원
    • 디지털산업정보학회논문지
    • /
    • 제6권4호
    • /
    • pp.153-160
    • /
    • 2010
  • MANET composed mobile nodes without central concentration control like base station communicate through multi-hop route among nodes. Accordingly, it is hard to maintain stability of network because topology of network change at any time owing to movement of mobile nodes. MANET has security problems because of node mobility and needs intrusion detection system that can detect attack of malicious nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system based on rules in order to more accurate intrusion detection. Cluster head perform role of monitor node to raise monitor efficiency of packet. In order to evaluate performance of proposed method, we used jamming attack, selective forwarding attack, repetition attack.