Development of Network Security Technology ETRI



Similar documents
Network Security Administrator

GR2000: a Gigabit Router for a Guaranteed Network

MANAGED SECURITY SERVICES

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes.

Introduction to Cyber Security / Information Security

SCADA SYSTEMS AND SECURITY WHITEPAPER

THE FUTURE OF SMART GRID COMMUNICATIONS

Network System Design Lesson Objectives

What would you like to protect?

Developing Network Security Strategies

Secured Voice over VPN Tunnel and QoS. Feature Paper

VoIP Resilience and Security Jim Credland

Potential Thesis Topics in Networking

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

IP-VPN Architecture and Implementation O. Satty Joshua 13 December Abstract

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

Recommended Wireless Local Area Network Architecture

Multi-Step Security System

Mobile Office Security Requirements for the Mobile Office

Cyber Security Where Do I Begin?

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

1.264 Lecture 37. Telecom: Enterprise networks, VPN

Case Study for Layer 3 Authentication and Encryption

Trusted Network Connect (TNC)

MPLS and IPSec A Misunderstood Relationship

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Managed Services The. The Road to Revenue. Pravin Mahajan Session Number Presentation_ID

Chapter 1 Instructor Version

Huawei Agile WAN Solution

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

CTS2134 Introduction to Networking. Module Network Security

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment

Introduction of Information Security Research Division

Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: Doc Type: Q & A with Explanations Total Questions: 50

Voice over IP Networks: Ensuring quality through proactive link management

Lecture 02b Cloud Computing II

Cisco Which VPN Solution is Right for You?

Course 4: IP Telephony and VoIP

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Cisco CCNP Optimizing Converged Cisco Networks (ONT)

HANDBOOK 8 NETWORK SECURITY Version 1.0

Transparent weaknesses in VoIP

Society, Law Enforcement and the Internet

An Oracle White Paper December The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

INTRODUCTION TO FIREWALL SECURITY

Detailed Description about course module wise:

Next Generation Networks Convergence, evolution and roadmaps

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

How To Get A Better Price For Your Phone In Orange (European)

DEPLOYING VoIP SECURELY

VPN. Date: 4/15/2004 By: Heena Patel

Fundamentals of Network Security Graphic Symbols

Security Design.

Chapter 5. Data Communication And Internet Technology

VPN Lesson 2: VPN Implementation. Summary

An Experimental Study on Wireless Security Protocols over Mobile IP Networks

Fortigate Features & Demo

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

VOIP Security Essentials. Jeff Waldron

MPLS VPN Security Best Practice Guidelines

Voice Over IP. MultiFlow IP Phone # 3071 Subnet # Subnet Mask IP address Telephone.

Eudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD.

Optimizing Networks for NASPI

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

How To Protect Your Network From Attack

NGN Network Architecture

Introduction to Computer Networking: Trends and Issues

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Models of Secure VoIP Systems. VoIP Security Best Practice. Vol. II. Models of Secure VoIP Systems (Version: 1.2) NEC Corporation

SECURING AN INTEGRATED SCADA SYSTEM. Technical Paper April 2007

How To Build A Network Security Firewall

Windows Web Based VPN Connectivity Details & Instructions

Security for 802 Access Networks: A Problem Statement

T.38 fax transmission over Internet Security FAQ

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Cisco Wireless Security Gateway R2

Security issues in Voice over IP: A Review

November Defining the Value of MPLS VPNs

Technical papers Virtual private networks

IP Telephony Management

Values Customer Satisfaction: It is our personal responsibility to satisfy and strive to exceed the expectations of our customers

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service

Constructing High Quality IP Core Network

Transcription:

Development of Network Security Technology ETRI

Contents Intro- ductions Market Trends Problem Definition Secure Networking Tech. Details of Network Security Tech.

Internet Paradigm Everything over Internet! But... Can be easily intercepted by monitoring transmission line Can be easily monitored and controlled by attackers Can be possible to disable networks by service disruption attacks Anti-Cyber Terror should be necessary! Security should be necessary!

Cyber Terrors? Internet SNIFFING! A B C.... LAN / Mail Worm ISP 1 Internet ISP 2

Problems Service disruption of E-commerce Exposure of network routing data Misusage of personal information Privacy Infringement Network disruption, Internet Internet,

Cyber Terror Technology Trends Multiple-attacks through networks Redirect attacks Attacks against server and PC Domestic hacking by foreigners Attacks by using information security technology System breakdown / decrease of network performance Host & network security should be necessary!

Host Security vs Network Security Host Security - mature - relatively secure Network Security - beginning - relatively non-secure

Network Security Evolution Individual Security - High secure algorithm - Intrusion detection - Intrusion protection - LAN/host security - Web security - E-mail security Current internet Integrated Security - High speed algorithm - IPsec - ESM - Security policy-based - Secure OS - Secure IC card Beginning of next generation internet 2002 Intelligent Active Security - QoS Security - Information warfare - Active security - Optical Security - Multicast security - Electronic voting Growth of next generation internet 2005

Market of Anti-Cyber Terror products 100% 80% PKI CA = 1998 value($m) = 2003 value($m) CAGR 60% 40% VPN Security management Firewall Anti-Virus 20% Authentication Algorithm 0% 10% 20% 30% 40% 50% Market Share

Products (1) Firewall For protection of internal networks of company, bank Firewall-I(CheckPoint), Gauntlet(TIS) (Securesoft), Secureworks( ) IDS (Intrusion Detection System) For risk analysis and system security Omniguard(Axent), RealSecure(ISS) Siren(pentasecurity), Neowatcher(Inzen)

Products (2) CA (Certificate Authority) PKI-based Authentication : Cyber Banking, EC VeriSign, CyberTrust TrustPro(SDS), ASSURE(Senextech) Anti-Virus Norton Antivirus(Symantec), PC-Cillin(Trans) V3Pro( ), ViRobot(Hauri)

Products (3) VPN (Virtual Private Network) Major network security system Cisco1700series(Cisco), VPN-1(CheckPoint) Secuwaysuite(Future System) Current trend Increase of integrated security service ESM (Enterprise Security Management) Security Consulting

Evolution of IT Progress of of IT IT Environment Changing of IT infrastructure due to increasing internet traffic WDM-based optical network Progress toward All IP-based wired & wireless convergent network Real feeling service by using BT-IT fusion technology Progress of of Security Technology Appearance of new security products due to changing IT environment Becomes major part of communication system Progress toward total security solution Increasing importance of network security service Passive security -> Active Security

Progress of Network Security

Problems of Present Security Tech (1) As security function is placed in network edge point Reduction of network performance is occurred As real time communication is difficult without secure OS & engine Users do not want to use security system

Problems of Present Security Tech (2) Security infrastructure needs many security functions As Individual security system is made for single purpose security function The individual systems can not interwork between them There are no functional regulations between security systems Hard to implement security infrastructure

Problems of Present Security Tech (1) Advanced countries develop CC-based security systems To improve international competition and reliability In korea, there is no CC-based security system Development of CC-based security system is required CC

Needs of New Security Service Security Technology becomes Major function of IT system Basic service of IT service Next generation internet Progresses toward All IP-based wired & wireless convergent networks Needs secure logical connection based on the convergent networks Needs new security service model Therefore, logical secure service network must be built by using Secure Networking and CC-based security service must be provided Secure Networking for connection between internet nodes is needed to realize integrated intrusion protection and back-tracing CC-based security system is needed to guarantee mutual connection between some different kinds of systems

Secure Networking Concept Internet 3.5G/4G Mobile Network

Secure Networking Tech. Trend (1) Advanced countries have built Common Criteria Mutual Recognition Arrangement(CCMRA) for developing CC-based security systems and make a study of secure networking technology USA invests $67,000,000 in study of security technology(2000) HPCC, IT2 projects DARPA make a study of new security technology based on active security mechanism European Union invests 540,000,000 Euros in study of network security (2000)

Secure Networking Tech. Trend (2) ITO of DARPA make a study of secure networking for network security and survivability Research goal Network Fault-Tolerant Survivability Denying Denial-of-Service Active Network Response Program # of projects Investment FTN 23 500M$ (2000~200 NAI, Telcordia, Princeton Univ. DC 21 4) Telcordia, Stanford, Xerox Palo Alto AN 59 - MIT, CMU, NAI, U.Penn FTN : Fault Tolerant Network AN : Active Network DC : Dynamic Coalition -

Domestic Research Trends Some security products have got domestic evaluation level which is not international mutual certification There is no CC-based security system Secure networking is under technical consideration

Secure Networking Technology Tolerance Adaptation Prevention Attacks Active Security Management Policy-based Security Management Secure Node System Hacking

Policy-based Optical Internet Security Management

Policy-based Network Management Trend Advanced countries Policy-based Network Management : HP, Extreme Networks, Cisco, Orchestream, Intel Policy-Framework : IETF Policy, DiffServ WG Application Networks : vbns, CA*net II, TEN-155 PS COPS PS COPS SLA PS COPS PS SLA

Policy-based Security Management Concept (1) ( )

Policy-based Security Management Concept (2) 24 map Groggy! ( )

Policy-based Security Management Concept (3) Individual Security Management Integrated Security Management API API Router Service Server

Active Security Management

Active Network Concept (1)

Active Network Concept (2)

Active Security Management Active Security Management ASM = Active Network Technology + Active Security Technology Active sensor network engine Performs active security management in real time without regard to network status and kinds of platform Active sensor programming language Is the description language for programming security mechanism and active security service Active security management system Performs active security management and control using mobile sensor technology, active sensor network engine, and active security core technology

Active Security Management Concept

Research Trends Active Network ITO of DARPA make a study of secure networking (1994) Participants : MIT, Bellcore, BBN. UCLA, Columbia, TASC, UArizona FAIN (Future Active IP Networks ) project European Union performs Information Society Technologies (IST) program Develop active node-based reliable, secure, manageable network architecture Participants : T-Nova Deutsche Telekom, France Telecom, Hitachi Europe Ltd., University College London, Jozef Stefan Institute MIRAInet Is next network solution (1999, NTT) Adaptive network Domestic research trend ETRI & some universities make a study of active network There is no result about active network

Optical Security

International IT traffic

Evolution of Optical Internet Transmission Capacity (b/s) 25 T 10T 100G 1G 10M Limits of Current Electronic Switching OC-1 Limits of Single Mode Fiber Bandwidth All-Optical Network BIT: WDM (multiple Channels), Soliton OC-3 OC-12 OC-48 1980 1990 2000 2010 Year OC-784 OC-192 Commercial TDM (single channel) Systems Optics Electronics

Comparisons

Optical Internet Testbed

NGI Testbed (x1000)

Directions of Optical Internet Development

Security Vulnerabilities of Optical Internet Vulnerabilities of Optical Internet? Vulnerabilities of present Internet Transparency Eavesdrop Security vulnerabilities of Optical Internet Service decline Service Disruption

Optical Security Concept Security vulnerabilities of optical internet are serious Tbps level encryption technology is needed for optical internet Absolutely secure crypto-algorithm is needed

The other technologies

The other technologies High secure crypto-algorithm Crypto-protocols for all IP wired & wireless convergent network Plug-in secure module Gbps level security on chip Secure OS Secure routing engine Secure gateway VPN service router Secure Node system Next generation wireless security technology Implementation of CC-based security system and standardization

Conclusions Individual security system -> multifunctional integrated security system New security mechanism is needed for mutual connection between security systems Functional regulations between security systems are needed Passive security system -> active security system CC-based security system for improving international competition Policy-based optical network security management Active security management Optical security CC-based secure network node