KR20170075240A - Firewall Apparatus and Driving Method Thereof - Google Patents
Firewall Apparatus and Driving Method Thereof Download PDFInfo
- Publication number
- KR20170075240A KR20170075240A KR1020150184639A KR20150184639A KR20170075240A KR 20170075240 A KR20170075240 A KR 20170075240A KR 1020150184639 A KR1020150184639 A KR 1020150184639A KR 20150184639 A KR20150184639 A KR 20150184639A KR 20170075240 A KR20170075240 A KR 20170075240A
- Authority
- KR
- South Korea
- Prior art keywords
- user
- application
- information
- packet
- firewall
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
FIELD OF THE INVENTION The present invention relates to a firewall device capable of improving security reliability.
A firewall device according to an embodiment of the present invention includes a firewall module for allowing or blocking a packet; A rule storage unit for storing signature information of applications; A first storage unit for storing an application policy for each user; A user information module for receiving login information of a first user from the AD server, searching the first storage application user application policy corresponding to the login information, and providing the first storage application application policy to the firewall module; And an identification engine for receiving the packet from the firewall module and providing the application identification information corresponding to the signature extracted from the packet to the firewall module with reference to the rule storage unit; The firewall module allows or blocks the packet according to the first user application policy and the application identification information.
Description
BACKGROUND OF THE INVENTION Field of the Invention [0002] The present invention relates to a firewall apparatus and a method of driving the same, and more particularly, to a firewall apparatus and a driving method thereof that can improve security reliability.
The firewall is installed at the front end of the internal network to prevent malicious codes and the like on the Internet from being propagated to the internal network. That is, the firewall is for protecting the internal network from the external network including the Internet network. For this purpose, policies for controlling packets are set in the firewall, and only the allowed packets are provided to the internal network according to a predetermined policy when the firewall is operated.
Such firewalls generally block or allow packets using five tuples (IP address and port number, etc.). However, if the packet is managed using 5 tuples, the availability of the firewall is limited and the reliability of the security is not high.
Accordingly, the present invention provides a firewall device and a method of driving the same, which can additionally detect an application and improve the reliability of utilization and security.
In addition, the present invention provides a firewall device and a method of driving the same, which can improve the reliability of security by controlling permission or denial of an application for each user.
A firewall device according to an embodiment of the present invention includes a firewall module for allowing or blocking a packet; A rule storage unit for storing signature information of applications; A first storage unit for storing an application policy for each user; A user information module for receiving login information of a first user from the AD server, searching the first storage application user application policy corresponding to the login information, and providing the first storage application application policy to the firewall module; And an identification engine for receiving the packet from the firewall module and providing the application identification information corresponding to the signature extracted from the packet to the firewall module with reference to the rule storage unit; The firewall module allows or blocks the packet according to the first user application policy and the application identification information.
According to the embodiment, the login information includes the ID of the user and the IP address of the computer to which the user is connected.
And a second storage unit connected to the user information module and storing the login information and permission and blocking information of the applications corresponding to the first user.
The identification engine may include a data extracting unit for extracting the signature from the packet, and a rule mapping unit for generating the application identification information by comparing the signature with the signature information stored in the rule storage unit do.
And an SSL proxy for decrypting and supplying the packet to the identification engine when the packet is encrypted according to the embodiment.
According to an embodiment, the first user application policy stores information on at least one of an allowed application and a blocked application.
A method of operating a firewall device according to an exemplary embodiment of the present invention includes: transmitting login information of a first user to a user information module; transmitting a first user application policy to a firewall module corresponding to the login information; The method comprising the steps of: inputting a packet from a computer to which the first user has logged in as a firewall module; identifying an application in response to the packet; and allowing or blocking the packet in response to the first user application policy do.
According to the embodiment, the login information includes the ID of the user and the IP address of the computer to which the user is connected.
The login information and the permission and blocking information of applications corresponding to the first user are additionally stored according to the embodiment.
According to the firewall device and the driving method thereof according to the embodiment of the present invention, it is possible to identify an application in a firewall device and to block or allow a packet corresponding to an application on a user-by-user basis. That is, in the embodiment of the present invention, applications that can be used by each user can be controlled, thereby improving the usability of the firewall device and the reliability of security.
1 is a diagram illustrating a firewall according to an embodiment of the present invention.
2A and 2B are diagrams showing an embodiment of an internal network and an AD server.
3 is a block diagram of a firewall according to an embodiment of the present invention.
4 is a diagram showing an embodiment of a general packet.
5 is a diagram showing an embodiment of the identification engine shown in Fig.
6 is a diagram showing an embodiment of a method of driving an application policy for each user.
7 is a diagram illustrating an embodiment of application-specific application information stored in the second storage unit.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Reference will now be made in detail to embodiments of the present invention and other details necessary for those skilled in the art to understand the present invention with reference to the accompanying drawings. However, the present invention may be embodied in many different forms within the scope of the appended claims, and therefore, the embodiments described below are merely illustrative, regardless of whether they are expressed or not.
That is, the present invention is not limited to the embodiments described below, but may be embodied in various forms. It is to be noted that, in the drawings, the same constituent elements are denoted by the same reference numerals and symbols as possible even if they are shown in different drawings.
1 is a diagram illustrating a firewall according to an embodiment of the present invention.
Referring to FIG. 1, a
The
For example, if the packet supplied from the first user is determined to be a "name on" application, the
2A and 2B are diagrams showing an embodiment of an internal network and an AD server.
Referring to FIG. 2A, a plurality of computers (PC1 to PCi: 201 to 20i) (i is a natural number) are located in the internal network. The plurality of
The user boots the
On the other hand, the
The
For example, the
In the present invention, the
In fact, as long as the
3 is a block diagram of a firewall according to an embodiment of the present invention. 4 is a diagram showing an embodiment of a general packet. FIG. 3 and FIG. 4 show only the parts necessary for the description of the present invention, and the configuration of the firewall device is not limited thereto.
3 and 4, a
The
The
In more detail, a packet is generally set to a predetermined size, for example, 1460 bytes. Such a packet is divided into a header and a data as shown in FIG. Five tuple information is stored in the header of the packet. In other words, the header stores the source IP, the destination IP, the source port, the destination port, and the protocol information. Here, the source IP is the address of the computer that transmitted the packet, the destination IP is the address of the computer receiving the packet, the source port is the port to which the packet is transmitted, the destination port is the port to which the packet is to be transmitted, IP communication protocol.
The data of the packet includes the information to be transmitted including the signature. Here, the signature is used as information for identifying an application. For example, when the application is set to "Nate on ", the data of the packet includes signature information such as" REQS ". In addition, when the application is set to a web site, for example, "Naver ", the data of the packet includes signature information such as" Host: www.naver.com ".
The signature information is included in the packets supplied in the early part of the consecutive packets. In fact, the signature information is included in the first or second packet among consecutively supplied packets.
The
On the other hand, if the application is not identified, the
Additionally, unidentified information includes unknown and insufficient-data. Unknown means that the signature information corresponding to the packet is not stored in the
The
The
In addition, the
The
The
The
For example, the
The
5 is a diagram showing an embodiment of the identification engine shown in Fig.
Referring to FIG. 5, an
The
The
The
6 is a diagram showing an embodiment of a method of driving an application policy for each user.
Referring to FIG. 6, a user inputs a user ID and a password using one of the
After the user logs in, the
The packet supplied from the
The
The
For example, if the user "Lee" is a computer person in charge, various applications can be used and the application under development can be tested. In this case, the policy of "Lee" may be set to allow all applications, including Unknown and insufficient-data. Also, the user "Lee" may be a developer who develops a specific product. In this case, as a policy of "Lee ", only applications necessary for development can be set to be allowed.
Meanwhile, the
7 is a diagram illustrating an embodiment of application-specific application information stored in the second storage unit.
Referring to FIG. 7, the developer can check the application statistics for each user using the information stored in the
In particular, in the present invention, permitted application information and blocked application information can be confirmed for each user. These statistics can be used to re-tune application policies or enhance security. For example, if the developer "Lee" tries to connect to the Chinese server using an unauthorized messenger (wechat, qq), the security policy for the "Lee" user can be added.
On the other hand, when the IP address "192.168.0.1" is assumed to be a public computer installed in a conference room or the like, different application policies are applied to each user (i.e., Kim, Lee) connected to the public computer. In other words, even when different users are connected to the same computer, the applications that can be used are set differently from each other, so that the reliability of security can be ensured.
Further, in the present invention, even if the computer IP address of the "Kim" user is changed by department movement, the application policy of the "Kim" user can be applied without changing the policy corresponding to the IP address. That is, since the application policy is applied using the login information of the user, the application policy can be applied to each user regardless of the computer used.
As described above, in the present invention, it is possible to set an application that can be used by each user, thereby improving the security and usability of the
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed exemplary embodiments. It will be apparent to those skilled in the art that various modifications may be made without departing from the scope of the present invention.
The scope of the present invention is defined by the following claims. The scope of the present invention is not limited to the description of the specification, and all variations and modifications falling within the scope of the claims are included in the scope of the present invention.
100: firewall device 110: firewall module
120: Identification engine 122: Data extraction unit
124: rule mapping unit 130: rule storage unit
140: SSL Proxy 150: User Information Module
160,170 storage unit 201,202,20i computer
300: AD server
Claims (9)
A rule storage unit for storing signature information of applications;
A first storage unit for storing an application policy for each user;
A user information module for receiving login information of a first user from the AD server, searching the first storage application user application policy corresponding to the login information, and providing the first storage application application policy to the firewall module;
And an identification engine for receiving the packet from the firewall module and providing the application identification information corresponding to the signature extracted from the packet to the firewall module with reference to the rule storage unit;
Wherein the firewall module permits or blocks the packet according to the first user application policy and the application identification information.
Wherein the login information includes a user ID and an IP address of a computer to which the user is connected.
And a second storage unit connected to the user information module and storing the login information and permission and blocking information of applications corresponding to the first user.
The identification engine
A data extracting unit for extracting the signature from the packet;
And a rule mapping unit for generating the application identification information by comparing the signature with the signature information stored in the rule storage unit.
Further comprising an SSL proxy for decrypting and supplying the packet to the identification engine when the packet is encrypted.
Wherein at least one of the permitted application and the blocked application is stored in the first user application policy.
Sending a first user application policy to the firewall module in response to the login information;
Inputting a packet from a computer to which the first user has logged into the firewall module;
Identifying an application in response to the packet;
And allowing or blocking the packet according to the first user application policy.
Wherein the login information includes a user ID and an IP address of a computer to which the user is connected.
Further comprising storing the login information and permission and blocking information of applications corresponding to the first user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150184639A KR101772683B1 (en) | 2015-12-23 | 2015-12-23 | Firewall Apparatus and Driving Method Thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150184639A KR101772683B1 (en) | 2015-12-23 | 2015-12-23 | Firewall Apparatus and Driving Method Thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20170075240A true KR20170075240A (en) | 2017-07-03 |
KR101772683B1 KR101772683B1 (en) | 2017-08-29 |
Family
ID=59357589
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150184639A KR101772683B1 (en) | 2015-12-23 | 2015-12-23 | Firewall Apparatus and Driving Method Thereof |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101772683B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102020178B1 (en) * | 2019-03-21 | 2019-09-09 | 김상환 | Fire wall system for dynamic control of security policy |
-
2015
- 2015-12-23 KR KR1020150184639A patent/KR101772683B1/en active IP Right Grant
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102020178B1 (en) * | 2019-03-21 | 2019-09-09 | 김상환 | Fire wall system for dynamic control of security policy |
Also Published As
Publication number | Publication date |
---|---|
KR101772683B1 (en) | 2017-08-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10776489B2 (en) | Methods and systems for providing and controlling cryptographic secure communications terminal operable to provide a plurality of desktop environments | |
US10652226B2 (en) | Securing communication over a network using dynamically assigned proxy servers | |
US7366902B2 (en) | System and method for authenticating a storage device for use with driver software in a storage network | |
JP5029701B2 (en) | Virtual machine execution program, user authentication program, and information processing apparatus | |
US20120084566A1 (en) | Methods and systems for providing and controlling cryptographic secure communications across unsecured networks | |
EP3605948B1 (en) | Distributing overlay network ingress information | |
WO2009097313A1 (en) | Network access control | |
KR102020178B1 (en) | Fire wall system for dynamic control of security policy | |
US12074863B2 (en) | Dynamic bypass | |
CN101488950A (en) | Symmetric key distribution framework for the internet | |
US8799645B2 (en) | Scalable distributed web-based authentication | |
EP2974121A1 (en) | Secure network communication | |
JP2012178010A (en) | Information processing system and information processing method | |
US20220345491A1 (en) | Systems and methods for scalable zero trust security processing | |
US20080263126A1 (en) | Internet bridge for applications and web servers | |
KR101772681B1 (en) | Firewall Apparatus and Driving Method Thereof | |
KR101772683B1 (en) | Firewall Apparatus and Driving Method Thereof | |
CN110875903A (en) | Security defense method and device | |
KR101404161B1 (en) | Network separation device using one time password, network separation system and method thereof | |
KR101749074B1 (en) | Firewall System and Driving Method Thereof | |
Kerai | Tracing VNC and RDP Protocol Artefacts on Windows Mobile and Windows Smartphone for Forensic Purpose |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |