Security > ħÀÔ¹æÁö½Ã½ºÅÛ(nIPS)    

Á¦Ç°°³¿ä/Ư¡   ±¸¼ºµµ   ÁÖ¿äÈ­¸é    
1. ICS(Intrusion Control System, ħÀÔÅëÁ¦½Ã½ºÅÛ)ÀÇ ±¸¼ºµµ
 

¢º Ä¿³Î±â¹ÝÀÇ ÅëÇÕ¿£Áø ±¸Á¶

ICS´Â ÅëÁ¦¿£Áø°ú ŽÁö¿£ÁøÀ¸·Î ±¸¼ºµÇ´Âµ¥, µÎ °¡Áö ¿£Áø ¸ðµÎ Ä¿³Î¿¡¼­ µ¿ÀÛÇÏ¸ç »óÈ£ À¯±âÀûÀ¸·Î ÅëÇյǾî ÀÖ´Ù.
ƯÁ¤ÇÑ ÆÐŶÀÌ ÅëÁ¦¿£ÁøÀ» Åë°úÇÏ¿´´Ù ÇÏ´õ¶óµµ ŽÁö¿£Áø¿¡¼­ ħÀÔ °ø°ÝÀ¸·Î ÆÇÁ¤µÇ¸é ±× Áï½Ã Æó±â(Drop)µÇ°í ¹Ýº¹µÇ´Â ħÀÔ °ø°Ý¿¡ ´ëÇؼ­´Â ÅëÁ¦¿£Áø¿¡¼­ »çÀü¿¡ ¸ðµÎ Æó±â(Drop)µÈ´Ù.


¢º ICS ¸ðµ¨ ±¸Á¶µµ-ƯÇãÃâ¿ø
   

ICS ¸ðµâÀº ÅëÁ¦¿£Áø°ú ŽÁö¿£ÁøÀ» žÀçÇÑ Ä¿³Î°èÃþ ¸ðµâ°ú Ä¿³Î°èÃþ ¸ðµâÀ» Á¦¾îÇÏ´Â ÀÀ¿ë°èÃþ ¸ðµâ·Î ±¸¼ºµÇ¾î ÀÖ´Ù. ÀÀ¿ë°èÃþ ¸ðµâÀº °¨»ç±â·ÏÀ» °ü¸®ÇÏ´Â RTLOG¿Í Ä¿³Î°èÃþÀÇ ¿£ÁøÀ» Á¦¾îÇÏ´Â RTICS·Î ±¸¼ºµÈ´Ù. Ä¿³Î°èÃþÀÇ ÅëÁ¦¿£Áø°ú ŽÁö¿£ÁøÀÇ ¿î¿ëÀ» On/Off ÇÒ ¼ö ÀÖ´Â ÅëÇÕ À¯¿¬¼ºÀ» Á¦°øÇÑ´Ù.


¢º ±ÔÄ¢±â¹ÝÀÇ Å½Áö Á¤Ã¥ ¿¹Á¦

   

ÅëÁ¦ Á¤Ã¥Àº »óźм®(Stateful Inspection)¿¡ ÀÇÇØ °ü¸®ÀÚÀÇ ¼öµ¿ Á¤Ã¥ ¼³Á¤À» ÃÖ¼ÒÈ­ ÇÒ »Ó ¾Æ´Ï¶ó ÀÀ¿ë°ÔÀÌÆ®¿þÀÌÀÇ »ç¿ëÀ» ¹èÁ¦ÇÒ ¼ö ÀÖ¾î ½Ã½ºÅÛ ¼º´É Çâ»óÀÌ °¡´ÉÇÏ´Ù.


¢º ±ÔÄ¢±â¹ÝÀÇ ÅëÁ¦ Á¤Ã¥ ¿¹Á¦

   



2. Gateway ¹æ½ÄÀÇ µ¿ÀÛ¸ðµå
 
ICS´Â Gateway µ¿ÀÛ ¸ðµå¿¡¼­ ħÀÔ °ø°ÝÀ¸·Î ÆÇÁ¤µÈ ÆÐŶ¿¡ ´ëÇØ °¡Àå È¿°úÀûÀ¸·Î ¹æ¾îÇÒ ¼ö ÀÖ´Ù. ħÀÔŽÁö½Ã½ºÅÛ(NIDS)Àº Passive ¹æ½ÄÀ¸·Î ÆÐŶÀ» Capture(º¹»ç)ÇÏ¿© ´ëÀÀÇÏ´Â ±¸Á¶À̱⠶§¹®¿¡ ħÀÔ °ø°Ý¿¡ ´ëÇØ È¿°úÀûÀÎ ¹æ¾î°¡ ºÒ°¡´ÉÇÏ´Ù. ¶ÇÇÑ NIDS µµÀÔ ½Ã¿¡´Â Ãß°¡·Î ÆÐŶ ¹Ì·¯¸µ ÀåºñÀÇ µµÀÔ ºñ¿ëÀÌ ¹ß»ýÇÏÁö¸¸, ICS µµÀÔ ½Ã¿¡´Â Ãß°¡ Àåºñ µµÀÔ ºñ¿ëÀÌ ¹ß»ýÇÏÁö ¾Ê´Â´Ù.


¢º ICS µ¿ÀÛ¸ðµå ¿¹Á¦1 - FirewallÀ» º¸À¯ÇÑ »óÅÂ

   


¢º ICS µ¿ÀÛ¸ðµå ¿¹Á¦2 - FirewallÀ» º¸À¯ÇÏÁö ¾ÊÀº »óÅÂ

   

3. ICS ÀÇ ÁÖ¿ä±â´É

  ¢º Á¤ÇüÈ­µÈ ŽÁö±ÔÄ¢(RIVA Signature)

»ç¿ëÀÚ Á¤ÀÇ Å½Áö±ÔÄ¢ ¼³Á¤À¸·Î ƯÁ¤ÇÑ °ø°Ý ÆÐÅÏ¿¡ ´ëÇØ ¹æ¾îÇÒ ¼ö ÀÖ°í, Å°¿öµå¿¡ ÀÇÇÑ Á¢±Ù ÅëÁ¦°¡ °¡´ÉÇÏ´Ù. ICSÀÇ Å½Áö±ÔÄ¢Àº Á¤±âÀûÀ¸·Î ÀÚµ¿ µ¿±âÈ­(¾÷µ¥ÀÌÆ®) µÈ´Ù.

Classification
Description
RIVA-S Special attack, Spoofed IP, TCP Ack Storm, Spoofed ARP flooding ¡¦
RIVA-1 Probing, Scanning for hosts and network
RIVA-2 Vulnerability of services and protocols
RIVA-3 CGI attack, Web contents attack, Worm/Virus
RIVA-4 Denial of service, DDoS
RIVA-5 Trojan horse, Backdoor attack
RIVA-U User-defined signature
 
ICSÀÇ Å½Áö±¸Á¶¸¦ ´Ü°èÈ­(´Ü¼øºÐ¼®+º¹Çպм®)ÇÏ¿© False Positive¸¦ ÃÖ¼ÒÈ­ ÇÏ¿´°í, ħÀÔ °ø°Ý À¯Çüº°·Î ºÐ·ùµÇ¾ú°í CVE(Common Vulnerabilities and Exposures)¸¦ Áö¿øÇÑ´Ù.


¢º Ä¿³Î±â¹ÝÀÇ Å½Áö¿£Áø

ICSÀÇ Å½Áö¿£ÁøÀº Ä¿³Î°èÃþ¿¡¼­ µ¿ÀÛÇϱ⠶§¹®¿¡ ÆÐŶÀ» ó¸®Çϴµ¥ ¼Ò¿äµÇ´Â ½Ã°£À» ÃÖ¼ÒÈ­ÇÏ¿© ´ë¿ë·® ³×Æ®¿öÅ©¿¡¼­µµ ¼º´ÉÀúÇÏ°¡ ¹ß»ýÇÏÁö ¾Ê´Â´Ù.
Passive ¹æ½ÄÀÇ Ä§ÀÔŽÁö½Ã½ºÅÛ(NIDS)Àº "ÆÐŶ¼öÁý(Capture) --> µ¥ÀÌÅÍÃà¾à --> ºÐ¼® --> ÆÇÁ¤"ÀÇ Ã³¸®°úÁ¤À» °ÅÄ¡°Ô µÇÁö¸¸, ICS´Â "ÆÐŶ¼öÁý", "µ¥ÀÌÅÍÃà¾à" 󸮰úÁ¤ÀÌ ´ëÆø »ý·«µÇ¾ú±â ¶§¹®¿¡ ´ë¿ë·® Æ®·¡ÇÈ ºÐ¼®ÀÌ °¡´ÉÇÏ´Ù.
¶ÇÇÑ ÆÐŶÀÇ »óźм®(Stateful Inspection)±â¹ýÀ» »ç¿ëÇÏ¿© Áߺ¹ ºÐ¼® ¹× False Positive¸¦ ÃÖ¼ÒÈ­ ÇÏ¿´´Ù.


¢º Active-active High Availability

º°µµÀÇ Load-balancer(L4 Switch)¿¡ ÀÇÇÑ Active-active ¹æ½ÄÀÇ °í°¡¿ë¼ºÀ» Áö¿øÇÏ¿©
Single point of failure¿¡ ´ëÀÀÇÒ ¼ö ÀÖ´Ù.
(Â÷±â ¹öÀü¿¡¼­ ÀÚü Active-active °í°¡¿ë¼ºÀ» Áö¿øÇÒ °èȹÀÓ)



¢º ³×Æ®¿öÅ© ´ë¿ªÆø °èȹ Á¶Á¤(Traffic Shaping)

ICSÀÇ ÅëÁ¦¿£ÁøÀº Çã¿ëµÈ ±ÔÄ¢¿¡ ´ëÇØ Traffic ShapingÀÌ °¡´ÉÇÏ¿© DoS(DDoS) °ø°Ý¿¡ ÀÇÇÑ ³×Æ®¿öÅ© ÀÚ¿ø ¼Ò¸ð¸¦ ¿øõÀûÀ¸·Î ÅëÁ¦ÇÒ ¼ö ÀÖÀ» »Ó ¾Æ´Ï¶ó Áß¿äÇÑ ¼­ºñ½º¿¡ ´ëÇØ ÀÏÁ¤ÇÑ ³×Æ®¿öÅ© ´ë¿ªÆø(Bandwidth)À» ÇÒ´çÇÏ¿© ¾ÈÁ¤ÀûÀÎ ¼­ºñ½º°¡ °¡´ÉÇÏ´Ù.


¢ºTraffic Shaping ¿¹Á¦



¡Ø Á¦Ç° ¹®ÀÇ

  • SI ÆÀ / ±èâ±Õ ÆÀÀå
    .........cgkim@rybusnet.com
    .........Tel. 02-2677-2083, HP. 010-5067-0674
  •  
    Copyright (c)2003  RyBusNet,INC. All rights reserved.