차세대 서비스를 위한 보안 기술 ㈜ 시큐어소프트 김홍선 사장 2005. 4. 13.  Flexible Business Flows  Restructuring, M&A & Relocation  Mobile business environments  High Agility.

Slides:



Advertisements
Similar presentations
Security Policy. TOPICS Objectives WLAN Security Policy General Security Policy Functional Security Policy Conclusion.
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Guide to Network Defense and Countermeasures Second Edition
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Lisa Farmer, Cedo Vicente, Eric Ahlm
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Chapter 12 Network Security.
IS Network and Telecommunications Risks
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Information Security in Real Business
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Securing a Wireless Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 7 City College.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Securing Information Systems
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Intranet, Extranet, Firewall. Intranet and Extranet.
Mobile and Wireless Communication Security By Jason Gratto.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Wireless Networking.
ShareTech 2015 Next-Gen UTM.
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter Network Security Architecture.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Policy and Configuration Compliance for Devices Connecting to the Wireless Network.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Managed Security Vikas Khanduri CCIE#13516,CCSP,CCDP,CCNP,MCSE.
Configuring Network Access Protection
Module 11: Designing Security for Network Perimeters.
Security fundamentals Topic 10 Securing the network perimeter.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
 Router › A router is the networking device that integrates two or more networks together, while controlling the data traffic over the entire network.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Beyond the Perimeter with Intelligent Security Alfredo Cusin Channel Mgr.
Securing Interconnect Networks By: Bryan Roberts.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
Network System Security - Task 2. Russell Johnston.
Security fundamentals
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Implementing Network Access Protection
Securing the Network Perimeter with ISA 2004
Security of a Local Area Network
Server-to-Client Remote Access and DirectAccess
Check Point Connectra NGX R60
Virtual Private Network
Introduction to Network Security
LM 5. Wireless Network Security
Presentation transcript:

차세대 서비스를 위한 보안 기술 ㈜ 시큐어소프트 김홍선 사장

 Flexible Business Flows  Restructuring, M&A & Relocation  Mobile business environments  High Agility in adopting new challenges  Distributed/Global Resources  Low cost & High availability -> Outsourcing  Global presence  The Internet as the Business Backbone  Legitimate communication schemes  Web, s, ERP, IP Phones, Remote Connectivity, etc.  Interface with various parties  Employees, Partners, Customers, Investors, Public Current Theme of Business Processes

 Various Options of Internet Connectivity  Access Media  Broadband, Wireless LAN, CDMA/GSM, WiBro 등  IP Devices  PC, Notebook, PDA, Cellular, IP Phone, 게임기 등  Internet-centric Services  Intranet/Extranet/E-Commerce 의 절대적 의존  Design with upgrade paths – BcN, IPv6, etc.  Efficiency of ROI  기존 투자에 대한 효과 극대화  Vendor independence – 표준 지향  Network administration 의 비용 절감 Paradigms of IT Infrastructure Flexibility + Mobility + Efficiency

 Perimeter Defense  Firewall –Commodity 화 되면서 VPN 기능 통합 –Software -> Appliance -> Hardware –Comprehensive coverage : ISP, Enterprises, SMP, SOHO  IDS - 관제 서비스와 연동되거나 IPS 로 진화  Applications & PC security  PKI & encryption – Component level 로 embedded  Anti-virus –PC Firewall 과의 통합 or Recovery Service 와의 연동 –Integration with Perimeter Appliance  Service  Consulting - 취약점 진단, 모의 해킹 & Policy setup  Managed Security Service - Remote administration or Total Outsourcing 정보보호산업의 현황

 Security Appliances  Ease of Implementation with Lower Points of Failures  Lower Cost of Manufacturing  Hardware engineering for High-end Services  Reasons - Real-time processing of high traffic transactions  Enabling Technologies -Network Processor, Custom Chipsets and ASICs  Security 시장의 Convergence  Embedded Security –PC Firewall, Anti-Virus, PKI, etc.  Network & Security –Consistent Transactions Control –Efficiency of Administration & Technical Services  Integration of Security Technologies –Integration of Firewall, Intrusion Prevention, Anti-Virus 정보보호산업의 Market Dynamics

Issues & Resolutions (1)  Deep Packet Inspection  Intrusion Detection & Prevention  End-Point Security with Quarantine Process  NAV (Network Anti-Virus) Capabilities  Real-time Anomaly Detection & Prevention  Managed Security Service with IDS/IPS agents Zero-Day Attacks Virus/Worm Propagation From IP Device 유해 트래픽 – Worm, P2P, Spam, etc.

Issues & Resolutions (2)  Network Access Management  Dynamic Policy Enforcement  AAA for WiBro, WiMax, and BcN  Seamless Integration with Legacy Systems  IP Management & User-aware Authentication  RADIUS & EAP  802.1x based Network Port Authentication Security Technologies for New Services 기업의 정보유출과 개인정보보호 Increase of Wireless LAN Deployment

Threat 1 - Gateway Perspective (D)DoS(D)DoSWORMWORM 유해 트래픽 - Buffer Overflow 를 이용 - 대용량 traffic 발생 - Network 가용성 위협 - Buffer Overflow 를 이용 - 대용량 traffic 발생 - Network 가용성 위협 - 무작위 공격에 의한 - 대용량 traffic 발생 - Global / speedy - Network 가용성 위협 - 무작위 공격에 의한 - 대용량 traffic 발생 - Global / speedy - Network 가용성 위협 - Intentional : : 유해 사이트, Spam - Unintentional : P2P, Messenger - Intentional : : 유해 사이트, Spam - Unintentional : P2P, Messenger IT 인프라와 서비스의 위협 트래픽 오염 정보 유출 네트워크 마비 위 협 요 소위 협 요 소위 협 요 소위 협 요 소 위 협 요 소위 협 요 소위 협 요 소위 협 요 소 Traditional Attack Traditional Attack - 시스템 권한 습득 및 정보 습득에 목적 - 시스템 권한 습득 및 정보 습득에 목적

New Security Requirements Deep Packet Inspection Deep Packet Inspection 실시간 해킹 탐지 (Signature 방식 ) 어플리케이션 통제 Packet 의 내용부분 검사 Wire Speed 유지 Throughput Latency Packet-Size Independence Packet-Size Independence Concurrent TCP Sessions Concurrent TCP Sessions Known Attack Detection & Prevention 최대한의 패턴 보유 Signature Matching 을 통한 탐지 및 차단 Signature Matching 을 통한 탐지 및 차단 최소화된 오탐율 Unknown Attack Detection & Prevention Anomaly Detection & Prevention Anomaly Detection & Prevention 지능형 임계값 설정 (Self Learning) 지능형 임계값 설정 (Self Learning) Granularity ( 섬세하고 세밀한 제어 ) Granularity ( 섬세하고 세밀한 제어 ) 네트워크 인프라 보호 네트워크 인프라에 대한 Monitoring Rate Control 을 통한 가용성 보장

기존 제품의 한계와 IPS 의 등장 Deep Packet Inspection 시 Wire Speed 유지 Unknown Attack Detection & Prevention Deep Packet Inspection Firewall IDSVirus Wall IPS 네트워크 인프라 보호 Known Attack Detection & Prevention

기존 제품 기반의 IPS 개발 방향 IDS X-based IPS - 패턴 및 다양한 탐지기법의 부족 - Traffic anomaly 분석에 한계 - Deep packet inspection 처리에 한계 -Traffic anomaly 분석에 의한 차단 기능 추가 - 간단한 탐지 패턴 추가 -Traffic 차단을 위한 기능 추가 (In-line mode 지원 ) -Unknow Attack 차단 불가 -Virus 외의 알려진 공격 차단 불가 - 성능의 한계 스위치 장비 FirewallVirusWall - 기존의 CPU 방식으로는 wire speed 보장 불가 - 간단한 탐지 패던 추가 - 알려진 WORM 탐지 패턴 추가 - 패턴 및 다양한 탐지기법의 부족 - Deep packet inspection 처리에 한계 New Design (IPS Architecture) New Design (IPS Architecture)

Performance Factors Throughput Packet-size Independence Concurrent TCP Sessions Latency Base : Deep Packet Inspection Packet Loss => High feasibility of Attacks Performance Degradation => Service 중단

IPS 의 Mission Statement  Real-time Deep Pack Inspection  Guaranteed Performance with packet-size independence  64 바이트에서도 wire speed 보장  Intrusion Prevention for Known Attacks  최대한의 signature 와 효율적인 업데이트 능력  최소한의 시간지연 (latency)  Anomaly Detection & Prevention for Unknown Attacks  방대한 states 상황을 저장하고 모니터링하는 능력  Robustness for Mission Critical Service  유해 트래픽과 어플리케이션에 대한 방어  P2P, Messenger, URL Filtering, 스팸메일 등

Network Security 의 Roadmap  제품마다 독립적으로 발전하던 보안기술이 “ 사용자의 보호 ” 라는 궁극적이고 공통된 목표를 달성하기 위하여, Network Security Layer 측면에서 아래와 같이 유기적으로 결합해야 함  Firewall 의 경우, Application level 의 보안 정책을 IPS 에게 맡기고 방화벽은 본래의 낮은 보안 Layer 를 형성하며 고성능으로 발전  IPS 의 경우, Deep Packet Inspection 을 in-line 모드화하면서 차단기능을 강화. 고성능을 바탕으로 하여 보다 상위 레벨인 Application level 의 보안 정책을 담당  공통된 기반 기술과 사용자의 요구 사항을 바탕으로 Security 와 Network 의 Convergence 가속화 IPS Deep Contents Inspection High-Performance Firewall Higher Layer Lower Layer

Threats 2 – End-Point Perspective  Lack of manageability and accountability  Legal responsibility of protecting critical assets (Service Providers, Manufacturers, HIPPA, Government, Financial Institutions, etc.)  Instantaneous infection through the network  Patch management 의 한계  Protection from access points  User-based AAA system 의 필요성 Access/Authorization Management Rapid Propagation of Virus/Worm Threats from Internal Resources

The Need for The Mobility Support Mobile Devices (Notebook PC, PDA, etc) Mobile Devices (Notebook PC, PDA, etc) Wireless Communications (Cellular, Wi-Fi, etc) Wireless Communications (Cellular, Wi-Fi, etc) Internet Connections (Home, Public Hotspot, Internet Café, etc) Internet Connections (Home, Public Hotspot, Internet Café, etc) Business Environment New Mobility Support for Enterprise Networks New Mobility Support for Enterprise Networks 802.1x Based Authentication 면역 네트워크 (Quarantine) Policy Enforcement

VPN Enterprise Network Resource Enterprise Network Resource Wireless Wired Outside Un-Trusted Network Inside Trusted Network ISP Hot Spot Mobil e Wireless LAN IEEE 802.1x based Authentication VPN Network S/W IEEE 802.1x Based Authentication Dynamic / Static VLAN WPABX VoI P Access Scenario for Enterprise Network

(Gartner Research, 월 ) 성숙된 시장 제품인 기술에 대한 보안 지 원  지속 성장 동력 신규 시장 WiMax,  신 성장 동력 WiBro 지원 예정  신 성장 동력 Technology Trigger Peak Of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity Maturity Visibility n a/g b 위치인지 기술 WPA (WiFi Protected Access) i e(QOS) d (WiMax Access) e (WiMax Mobile) RFID k UWB 무선 기술 성숙 주기 : 새로운 제품 포트폴리오

Network Service Authentication Server Authenticator Supplicant RADIUS All Traffic Logical Port Physical Port AP Switch IEEE 802.1X Model

Security Level Authentication Encryption Default SSID Disabled Static WEP Shared Key Shared Key Dynamic WEP EAP-MD5 PEAP EAP-TTLS EAP-TLS MAC Authentication TKIP MAC Filtering AES EAP-SIM EAP (Extensible Authentication Protocol) High Low

IEEE 802.1x Dynamic WEP EAP-TLS EAP-TTLS PEAP 무선 랜 보안 규격인증방식암호화 TKIP 64/128 bit Per Session Per User Per Packet IEEE i Compatible An Example for Wireless LAN Security

Multi-Dimensional Access Matrix Unauthorized PC Authorized Notebook Interne t Enterprise Network Enterprise Network Home, Hotel, Library, Customer Site or Internet Cafe  User Integrity Check  Up to date Virus Files  Personal F/W running  Certificate  Authentication Process  L2 Level Access Control Through Switch, Router, Firewall, IPS, VPN, AP …  802.1X Standard Intranet Extranet ERP Integrated Policy Enforcement Server IEEE 802.1x Authentication Server F/W SSL VPN Authorized Notebook Authorized Notebook Wired Wireless

Audi t Encryption Privilege Definition User Identification & Authentication Layer 2 IEEE 802.1x Layer 3 and Upper AAA Server Policy Management Server Policy management based on AAA IPSEC VPN SSL VPN etc. Authorization Security Policy etc. Inventory Control Accounting Logging, ESM etc. Authentication Access Control

 Beyond Perimeter Defense  Protection from Virus/Worms infection  Monitoring internal activities  Dynamic policy updates  Efficient control of security budgets  Freedom from dominant players Objective of Secure Enterprise Mobility  End-Point Security  User-aware AAA implementation  Multi-layered Security  Standard-based Security Planning  Manageability  Accountability Policy Enforcement

Security as the Enabler of IT Infrastructure 802.1X Based AAA Quarantine Gateway End-Point Security Firewall/VPN IPS Enterprise Network Monitoring Dynamic Updates Access Control & Tunneling AAA

 Deep Packet Inspection – IPS, Firewall  Zero-Day Attacks Defense  802.1x Based Authentication  Quarantine Network  Dynamic Policy Enforcement Summary: Key Technologies & Terms