Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attack defending system and attack defending method

a technology of attack defense and system, applied in the field of security countermeasure technique in the computer network, can solve the problems of ineffective detection or defense of attacks, loss of network speed, and problems beyond conventional techniques, and achieve the effect of effective defens

Inactive Publication Date: 2008-07-17
NEC CORP
View PDF3 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0018]It is therefore an object of the present invention to provide an attack defending system and an attack defending method as well as a firewall unit, which allow effective defense against attacks from external networks even when a communication system uses a communication path encryption technique.
[0020]Yet another object of the invention is to provide an attack defending system and an attack defending method as well as a firewall unit, which can block securely unauthorized packets directed to a server to be protected.
[0031]As described above, according to the invention, since an input IP packet is guided based on the header information of the input IP packet, the system can effectively detect and defend against attacks even when an encryption technique is employed in accesses from an external network to an internal network. Even when any communication path encryption technique is employed, at least the source IP address or the destination IP address described in an IP header is not encrypted. Further, the guiding to the decoy unit by the firewall unit can be executed based on the information described in the IP header.
[0032]Furthermore, according to the invention, the network performance can be maintained at a high level in a high-speed network environment because the method of guiding to the decoy unit at the firewall unit can be realized with a simple algorithm based on a small number of parameters.

Problems solved by technology

However, the above conventional techniques have problems listed below.
A first problem is that attacks cannot be effectively detected or defended against when a communication path encryption technique such as SSL (Secure Socket Layer) and IPSec (that has obtained RFC2401) is used between an attack-source host on an external network and a server on an internal network.
A second problem is that there are some packets overlooked by an inspection or the speediness of a network is lost since the performance of an attack detecting section cannot catch up completely with the speedup of networks in recent years.
However, the number of packets to be inspected is drastically increasing due to the speedup of networks.
Therefore, it is not possible to distribute packets correctly, permitting normal accesses to be guided to the substitute network and anomalous accesses to be guided to the internal network.
A third problem is that it is difficult to improve the accuracy of detecting attacks.
Therefore, an intrusion detection system often mistakenly detects this maintenance work as attacks.
As is known with Web applications, various application programs such as database operation as a subsystem of a server are often run and attacks causing unauthorized operation taking advantage of such vulnerability of the subsystem are often seen.
However, there is a risk of receiving unknown attacks in the case where there is a subsystem created specifically for a site or where configuration of a server or a subsystem is not complete though the server or the subsystem is a commonly-used one.
In a server system provided with subsystems such as databases and plug-in modules, in which a specific access procedure is defined in a communication protocol between the server system and a client (that is, in the case of a stateful protocol), the client / server communication fails at both of the decoy server and the regular server when using such a method that only suspicious accesses are lured into a server which is not a regular server, such as a decoy server.
Especially when an access has been mistakenly lured into the decoy server, a server failure will occur since processes to be executed on the regular server are not executed thereon.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack defending system and attack defending method
  • Attack defending system and attack defending method
  • Attack defending system and attack defending method

Examples

Experimental program
Comparison scheme
Effect test

first embodiment

[0104]1.1) Structure

[0105]Referring to FIG. 2, the firewall unit 1 is connected with the Internet 3 through an external communication interface 100 and is connected with the internal network 4 through a first internal communication interface 104.

[0106]A packet filter 101 is connected between the external communication interface 100 and a guiding section 103, and executes packet filtering according to access control rules obtained from an access control list management section 102. As described later, the packet filter 101 transfers an IP packet received from one of the external communication interface 100 and the guiding section 103 to the other, or discards the received packet without transferring it.

[0107]A packet accepted by the packet filter 101 is sent to the guiding section 103. The guiding section 103 refers to a guiding list (FIG. 5), which will be described later, to guide the IP packet received from the packet filter 101 to either of the first internal communication interf...

second embodiment

[0159]2.1) Structure

[0160]Referring to FIG. 15, a firewall unit 5 according to a second embodiment of the present invention is provided with a confidence management section 502 added to the firewall unit 1 of the first embodiment as shown in FIG. 2, and is further provided with a guiding section 501 instead of the guiding section 103. The guiding section 501 is capable of determining a packet forwarding direction depending on a confidence level. Hereinafter, blocks similar to those previously described with reference to FIG. 2 are denoted by the same reference numerals and detailed descriptions on them will be omitted.

[0161]In FIG. 15, when having received a packet, the guiding section 501 outputs the source IP address of the received IP packet to the confidence management section 502 and obtains a corresponding confidence level. When having received the confidence level, the guiding section 501 compares the confidence level with a predetermined threshold value and, depending on its...

third embodiment

[0188]FIG. 22 shows a firewall unit of an attack defending system according to a third embodiment of the invention and FIG. 23 shows an example of the firewall unit. A firewall unit 6 in the third embodiment has the guiding section 501 and the confidence management section 502 which are connected as shown in FIG. 15 in addition to the guiding section 103 in the firewall unit 1 as shown in FIG. 2.

[0189]More specifically, as shown in FIG. 23, a second guiding section 501 may be provided as a subsequent stage of a first guiding section 103. To the contrary, the second guiding section 501 may be provided as a previous stage of the first guiding section 103.

[0190]In either of these structures, effective protection can be achieved against worm-like attacks carried out by randomly selecting IP addresses and active targeting attacks. Furthermore, even when a host is infected with a worm after the host has been trusted by the second guiding section 501, the decoy unit 2 can inspect whether a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An attack defending system allows effective defense against attacks from external networks even when a communication system uses a communication path encryption technique such as SSL. A firewall device and a decoy device are provided. The firewall device refers to the header of an input IP packet and, when it is determined that the input IP packet is suspicious, it is guided into the decoy device. The decoy device monitors a process providing a service to detect the presence or absence of attacks. When an attack has been detected, an alert including the attack-source IP address is sent to the firewall device so as to reject subsequent packets from attack source.

Description

BACKGROUND OF THE INVENTION[0001]1. Field of the Invention[0002]The present invention relates generally to a security countermeasure technique in a computer network, and more particularly to a system and a method allowing protection of resources on an internal network against attacks from external networks.[0003]2. Description of the Related Art[0004]As defense techniques against attacks from external networks, the following approaches have been proposed: (1) firewall; (2) intrusion detection system; and (3) decoy (or honeypot) system.[0005]An example of the firewall is disclosed in Japanese Patent Application Unexamined Pub. No. H8-44642 (hereafter referred to as Patent Document 1). According to the Patent Document 1, a firewall is installed at an interface between an external IP network and an internal Ethernet. The firewall determines whether a packet to be inspected should pass through from the external network to the internal network. Specifically, the firewall is provided with...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F13/00H04L12/66H04L29/06
CPCH04L63/0227H04L63/0263H04L63/20H04L63/1408H04L63/1491H04L63/101
Inventor NAKAE, MASAYUKIYAMAGATA, MASAYA
Owner NEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products