WO2022270893A1 - 단말의 보안 패킷에 기반한 네트워크 보안 모니터링 장치 및 방법 - Google Patents
단말의 보안 패킷에 기반한 네트워크 보안 모니터링 장치 및 방법 Download PDFInfo
- Publication number
- WO2022270893A1 WO2022270893A1 PCT/KR2022/008852 KR2022008852W WO2022270893A1 WO 2022270893 A1 WO2022270893 A1 WO 2022270893A1 KR 2022008852 W KR2022008852 W KR 2022008852W WO 2022270893 A1 WO2022270893 A1 WO 2022270893A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- packet
- monitoring
- security
- information
- Prior art date
Links
- 238000012806 monitoring device Methods 0.000 title claims abstract description 78
- 238000000034 method Methods 0.000 title claims abstract description 76
- 238000012544 monitoring process Methods 0.000 claims abstract description 137
- 230000004044 response Effects 0.000 claims description 49
- 238000004458 analytical method Methods 0.000 claims description 34
- 238000004422 calculation algorithm Methods 0.000 claims description 11
- 238000012800 visualization Methods 0.000 claims description 10
- 230000003044 adaptive effect Effects 0.000 claims description 5
- 238000007794 visualization technique Methods 0.000 claims description 5
- 238000007689 inspection Methods 0.000 abstract description 8
- 230000006870 function Effects 0.000 description 73
- 238000004891 communication Methods 0.000 description 64
- 238000010586 diagram Methods 0.000 description 29
- 238000005516 engineering process Methods 0.000 description 24
- 230000008569 process Effects 0.000 description 23
- 238000012545 processing Methods 0.000 description 18
- 238000013528 artificial neural network Methods 0.000 description 14
- 238000007726 management method Methods 0.000 description 14
- 230000005540 biological transmission Effects 0.000 description 12
- 238000010801 machine learning Methods 0.000 description 9
- 230000002159 abnormal effect Effects 0.000 description 8
- 230000003190 augmentative effect Effects 0.000 description 8
- 230000015556 catabolic process Effects 0.000 description 7
- 238000006731 degradation reaction Methods 0.000 description 7
- 210000002569 neuron Anatomy 0.000 description 7
- 230000009471 action Effects 0.000 description 5
- 230000003068 static effect Effects 0.000 description 5
- 238000012546 transfer Methods 0.000 description 5
- 238000013473 artificial intelligence Methods 0.000 description 4
- 230000006872 improvement Effects 0.000 description 4
- 238000012549 training Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 238000013135 deep learning Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 230000004913 activation Effects 0.000 description 2
- 238000004873 anchoring Methods 0.000 description 2
- 230000009118 appropriate response Effects 0.000 description 2
- 239000000969 carrier Substances 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 239000003795 chemical substances by application Substances 0.000 description 2
- 238000002485 combustion reaction Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000014509 gene expression Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002787 reinforcement Effects 0.000 description 2
- 238000013468 resource allocation Methods 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 210000000225 synapse Anatomy 0.000 description 2
- 230000000946 synaptic effect Effects 0.000 description 2
- 230000008685 targeting Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 206010000117 Abnormal behaviour Diseases 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 210000004027 cell Anatomy 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000010835 comparative analysis Methods 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000001186 cumulative effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000003745 diagnosis Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000010438 heat treatment Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000005226 mechanical processes and functions Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 238000012358 sourcing Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 238000001356 surgical procedure Methods 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0686—Additional information in the notification, e.g. enhancement of specific meta-data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0852—Delays
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/20—Support for services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/20—Support for services
- H04L49/208—Port mirroring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0273—Traffic management, e.g. flow control or congestion control adapting protocols for flow control or congestion control to wireless environment, e.g. adapting transmission control protocol [TCP]
Definitions
- the present invention relates to an apparatus and method for monitoring network security based on security packets of a terminal.
- a network generally includes a variety of devices having communication links and communication capabilities connected to the communication links.
- devices related to the network include computers, peripheral devices, routers, storage devices, and various electrical appliances having communication interfaces with the processor.
- the term "device” typically includes logic devices or other devices capable of processing and exchanging functionality and data, and may include home devices as well as general purpose computers.
- a client device requests access to a server having a specific IP address in order to use a web site, and connects after waiting time.
- performance of a network service associated with the server may be degraded due to a bottleneck.
- a service performance or quality problem occurs, a user's waiting time increases due to delay, resulting in a decrease in service utilization rate, which leads to a decrease in productivity and sales.
- an increase in IT operation costs may occur, and server operators and/or related business managers may encounter unfavorable results such as a decrease in corporate competitiveness.
- FIG. 1 is a conceptual diagram illustrating a process of performing conventional network service management.
- the IT team leader issues commands related to quality management to a network operation part, a server operation part, a database development part, and an application development part, respectively.
- a technical problem of the present invention is to provide an apparatus and method for monitoring network security based on security packets of a terminal.
- a network security monitoring method performed by a network monitoring apparatus includes monitoring a state of a client terminal, obtaining a security check packet generated based on a result of the monitoring from a network (the security The check packet includes UID (user ID) information, length information, and monitoring result information of the client terminal), obtaining a mirroring packet mirrored in a network switching device from the network, and the security check packet and and executing security monitoring for the network based on at least one of the mirroring packets.
- UID user ID
- Security monitoring of the network is performed by a network monitoring device assigned an IP address on the network, and obtaining the security check packet from the network involves the network monitoring device using the IP address to perform the security check. It may include receiving a packet.
- the security check packet has a TCP packet format including at least a TCP header and a TCP payload, and the TCP payload may include at least one field information of a UID field, a length field, and a monitoring result field.
- the security check packet has a UDP packet format including at least a UDP header and a UDP payload, and the UDP payload may include at least one field information of a UID field, a length field, and a monitoring result field.
- the UID information is information for uniquely identifying at least one of the client terminal or a client monitoring device for monitoring a state of the client terminal
- the length information is information indicating the length of the monitoring result information
- the monitoring result information may be information indicating a result of monitoring the state of the client terminal.
- the security check packet may be generated from a client monitoring device integrated in the client terminal.
- Security monitoring of the network is performed by a network monitoring device that is located and operated in at least one of an independent network node connected to the network, an input or output terminal of a plane on the network, or a server that is a destination of packets on the network that can be characterized.
- the network monitoring device may be characterized in that two or more locations are operated in the network.
- the network switch may be configured to mirror packets at any one of OSI layer 2, OSI layer 3, OSI layer 4, and OSI layer 7.
- the security packet includes an operation of monitoring the system log file of the terminal, an operation of determining whether an access attempt to the terminal occurs from an IP other than the allowed IP included in the white list, an operation of analyzing packet information about the terminal, and an operation of analyzing the terminal. It may be generated when it is determined that a security problem has occurred in the client terminal by at least one of an operation of analyzing state information of the terminal and an operation of acquiring alive information indicating whether connection to the terminal is possible.
- Executing security monitoring for the network includes utilizing a packet analysis algorithm corresponding to at least one protocol of HTTP, IP, UDP, TCP, and DNS, wherein the packet analysis algorithm is configured to analyze the mirrored packet by extracting at least one of URL, source IP, destination IP, and time information from the mirrored packet in an adaptive manner, Latency, traffic to the first server through the Internet, response latency for each section on the server side, web response dash time, app response latency, response latency between servers, response latency for each server, each server It may be configured to determine at least one of the number of waiting sessions (wait), an index for each application URI, and an index for each DB server query.
- the packet analysis algorithm is configured to analyze the mirrored packet by extracting at least one of URL, source IP, destination IP, and time information from the mirrored packet in an adaptive manner, Latency, traffic to the first server through the Internet, response latency for each section on the server side, web response dash time, app response latency, response latency between servers, response latency for each server, each server
- the method further comprises visualizing and displaying a result of security monitoring for the network, wherein the visualization comprises at least one of generating a graph in a meaningful form, generating a table, and generating a flow map. It may mean visualizing information including at least one statistic of indicators related to current network performance using one visualization method.
- a monitoring device for monitoring a client terminal performs security monitoring on the client terminal to generate monitoring result information, and based on the result of the security monitoring, UID (user ID) information of the client terminal , length information, and a security check packet including monitoring result information, and transmit the security check packet via the network.
- UID user ID
- the monitoring device includes an operation of monitoring the system log file of the terminal, an operation of determining whether an access attempt to the terminal occurs from an IP other than the allowed IP included in the white list, an operation of analyzing packet information about the terminal, and an operation of analyzing the terminal.
- the security check packet may have a TCP packet format including at least a TCP header and a TCP payload, and the TCP payload may include at least one field information of a UID field, a length field, and a monitoring result field.
- the security check packet has a UDP packet format including at least a UDP header and a UDP payload, and the UDP payload may include at least one field information of a UID field, a length field, and a monitoring result field.
- the monitoring device may operate integrated with the client terminal.
- a network monitoring device for monitoring packets on a network obtains a security check packet transmitted from a client monitoring device for monitoring a client terminal, and obtains a mirroring packet from a network switching device for mirroring packets, And it may be configured to execute security monitoring for the network by analyzing at least one of the security check packet and the mirroring packet.
- the network monitoring device may be configured to receive an IP address assigned on the network and to receive a security check packet as a TCP packet based on the IP address.
- the network monitoring device may be configured to obtain a security check packet as a UDP packet by monitoring packets on a path on the network without being assigned an IP address on the network.
- the network monitoring device includes a packet analysis algorithm corresponding to at least one protocol of HTTP, IP, UDP, TCP, and DNS, and the packet analysis algorithm is configured to detect the mirrored packets in an adaptive manner for each protocol. It is configured to analyze the mirrored packet by extracting at least one information of URL, source IP, destination IP, and time information, and from the mirrored packet to the perceived delay time of the user at the user terminal and the initial server through the Internet. Traffic, server-side response latency (latency), web response dash time, app response latency, response latency between servers, response latency by server, number of sessions waiting for response by server (wait), application URI It may be configured to determine at least one of a star indicator and an indicator for each query (DB Query) of the DB server.
- DB Query an indicator for each query
- the network monitoring device is connected to a service module that visualizes security monitoring results of the network monitoring device for the network, and the service module creates a graph in a meaningful form, creates a table, and flows maps ) may be configured to visualize information including at least one statistic of indicators related to the performance of the current network using at least one visualization method during the generation of ).
- the network monitoring device may be located and operated in at least one of an independent network node connected to the network, an input or output terminal of a plane on the network, or a server serving as a destination of a packet on the network.
- the network monitoring device may operate by being located at least two in the network.
- the present invention not only the security and performance of the terminal itself can be monitored, but also the security and performance of the network to which the terminal is connected can be monitored, and visibility and intuitiveness of the entire area of the network are secured, thereby securing the security and performance of network services. It has the effect of preemptively managing (preventing) problems.
- FIG. 2 is a conceptual diagram illustrating a wireless communication system to which the present invention can be applied.
- FIG. 4 is a block diagram showing a radio protocol structure for a control plane.
- NG-RAN New Generation Radio Access Network
- FIG. 6 is a block diagram illustrating functional partitioning between NG-RAN and 5GC.
- FIG. 7 is a diagram showing another example of a wireless communication system to which the technical features of the present invention can be applied.
- FIG. 8 is a diagram showing another example of a wireless communication system to which the technical features of the present invention can be applied.
- FIG. 10 is a diagram for explaining a method of performing network security monitoring based on a security check packet according to an embodiment according to a first scenario.
- 11 is a security packet structure according to the first scenario.
- FIG. 12 is a diagram for explaining a method of performing network security monitoring based on a security check packet according to an embodiment according to a second scenario.
- 13 is a security packet structure according to the second scenario.
- FIG. 14 is a diagram showing another example of a wireless communication system to which the technical features of the present invention can be applied.
- 15 is a 5G NPN security architecture providing a network security monitoring function according to an example.
- 16 is a 5G NPN security architecture providing a network security monitoring function according to another example.
- FIG. 19 is a block diagram illustrating a connection configuration between a network monitoring device and other devices in a network according to an embodiment of the present invention.
- 21 is a block diagram specifically illustrating a network monitoring device according to an embodiment of the present invention.
- first and second may be used to describe various components, but the components should not be limited by the terms. These terms are only used for the purpose of distinguishing one component from another. For example, a first element may be termed a second element, and similarly, a second element may be termed a first element, without departing from the scope of the present invention.
- the terms and/or include any combination of a plurality of related recited items or any of a plurality of related recited items.
- a user basically means a user of a user terminal. However, in some cases, it also means a user of the network monitoring device according to an embodiment of the present invention.
- a network operator and/or network manager is a person who manages a network related to a network monitoring device, and may refer to a user of the network monitoring device.
- a network monitoring device is a device that calculates indicators related to network security and performance, and may be referred to as a packet mirroring device.
- the network monitoring device may be implemented as a device for visualizing the security and performance indicators of network services, it may be referred to as a network monitoring visualization device.
- the network monitoring device may exist as an independent device or may be provided as a function implemented by another entity in the network.
- the network monitoring device may be called a network monitoring function (hereinafter referred to as NMF). Therefore, the NMF that monitors packets input and output to the server may be called a network server monitoring function (NMSF), and the NMF that monitors the user terminal (or client terminal) may be called a network client monitoring function (network client monitoring function: NMCF).
- NMF network monitoring function
- NMSF network server monitoring function
- NMCF network client monitoring function
- network security and performance may be used generically, in relation to communication security and performance in servers, communication networks, and clients.
- E-UTRAN Evolved-UMTS Terrestrial Radio Access Network
- LTE Long Term Evolution
- the E-UTRAN includes a base station (BS) 20 that provides a control plane and a user plane to a user equipment (UE) 10.
- the terminal 10 may be fixed or mobile, and may be referred to by other terms such as a mobile station (MS), a user terminal (UT), a subscriber station (SS), a mobile terminal (MT), and a wireless device.
- the base station 20 refers to a fixed station that communicates with the terminal 10, and may be called other terms such as an evolved-NodeB (eNB), a base transceiver system (BTS), and an access point.
- eNB evolved-NodeB
- BTS base transceiver system
- Base stations 20 may be connected to each other through an X2 interface.
- the base station 20 is connected to an Evolved Packet Core (EPC) 30 through the S1 interface, and more specifically, to a Mobility Management Entity (MME) through the S1-MME and a Serving Gateway (S-GW) through the S1-U.
- EPC Evolved Packet Core
- MME Mobility Management Entity
- S-GW Serving Gateway
- the EPC 30 is composed of an MME, an S-GW, and a Packet Data Network-Gateway (P-GW).
- the MME has access information of the terminal or information about the capabilities of the terminal, and this information is mainly used for mobility management of the terminal.
- the S-GW is a gateway with E-UTRAN as an endpoint
- the P-GW is a gateway with PDN as endpoint.
- the layers of the Radio Interface Protocol between the terminal and the network are L1 (layer 1), L1 (layer 1), It can be divided into L2 (second layer) and L3 (third layer).
- the physical layer belonging to the first layer provides an information transfer service using a physical channel.
- a Radio Resource Control (RRC) layer located in layer 3 serves to control radio resources between a terminal and a network. To this end, the RRC layer exchanges RRC messages between the terminal and the base station.
- RRC Radio Resource Control
- FIG. 3 is a block diagram showing a radio protocol architecture for a user plane
- FIG. 4 is a block diagram showing a radio protocol architecture for a control plane.
- the user plane is a protocol stack for transmitting user data
- the control plane is a protocol stack for transmitting control signals.
- a physical (PHY) layer provides an information transfer service to an upper layer using a physical channel.
- the physical layer is connected to a medium access control (MAC) layer, which is an upper layer, through a transport channel.
- MAC medium access control
- Data moves between the MAC layer and the physical layer through the transport channel. Transmission channels are classified according to how and with what characteristics data is transmitted through the air interface.
- the physical channel may be modulated using OFDM (Orthogonal Frequency Division Multiplexing) and utilizes time and frequency as radio resources.
- OFDM Orthogonal Frequency Division Multiplexing
- Functions of the MAC layer include mapping between logical channels and transport channels and multiplexing/demultiplexing MAC service data units (SDUs) belonging to the logical channels into transport blocks provided as physical channels on the transport channels.
- SDUs MAC service data units
- the MAC layer provides services to the Radio Link Control (RLC) layer through logical channels.
- RLC Radio Link Control
- RLC Radio Bearer
- TM transparent mode
- UM unacknowledged mode
- Acknowledged Mode acknowledged Mode
- AM provides three operation modes.
- AM RLC provides error correction through automatic repeat request (ARQ).
- the Radio Resource Control (RRC) layer is defined only in the control plane.
- the RRC layer is responsible for the control of logical channels, transport channels, and physical channels in relation to configuration, re-configuration, and release of radio bearers.
- RB means a logical path provided by the first layer (PHY layer) and the second layer (MAC layer, RLC layer, PDCP layer) for data transfer between the terminal and the network.
- the functions of the Packet Data Convergence Protocol (PDCP) layer in the user plane include delivery of user data, header compression, and ciphering.
- Functions of a Packet Data Convergence Protocol (PDCP) layer in the control plane include transmission of control plane data and encryption/integrity protection.
- Establishing an RB means a process of defining characteristics of a radio protocol layer and a channel and setting specific parameters and operation methods to provide a specific service.
- RBs can be further divided into two types: Signaling RBs (SRBs) and Data RBs (DRBs).
- SRBs Signaling RBs
- DRBs Data RBs
- the SRB is used as a path for transmitting RRC messages in the control plane
- the DRB is used as a path for transmitting user data in the user plane.
- the terminal When an RRC connection is established between the RRC layer of the terminal and the RRC layer of the E-UTRAN, the terminal is in an RRC connected state, otherwise it is in an RRC idle state.
- a downlink transmission channel for transmitting data from a network to a terminal includes a broadcast channel (BCH) for transmitting system information and a downlink shared channel (SCH) for transmitting user traffic or control messages.
- Traffic or control messages of a downlink multicast or broadcast service may be transmitted through a downlink SCH or may be transmitted through a separate downlink multicast channel (MCH).
- an uplink transmission channel for transmitting data from a terminal to a network includes a random access channel (RACH) for transmitting an initial control message and an uplink shared channel (SCH) for transmitting user traffic or control messages.
- RACH random access channel
- Logical channels located above transport channels and mapped to transport channels include BCCH (Broadcast Control Channel), PCCH (Paging Control Channel), CCCH (Common Control Channel), MCCH (Multicast Control Channel), MTCH (Multicast Traffic Channel) Channel), etc.
- BCCH Broadcast Control Channel
- PCCH Paging Control Channel
- CCCH Common Control Channel
- MCCH Multicast Control Channel
- MTCH Multicast Traffic Channel
- a physical channel is composed of several OFDM symbols in the time domain and several sub-carriers in the frequency domain.
- One sub-frame is composed of a plurality of OFDM symbols in the time domain.
- a resource block is a resource allocation unit and is composed of a plurality of OFDM symbols and a plurality of sub-carriers.
- each subframe may use specific subcarriers of specific OFDM symbols (eg, the first OFDM symbol) of the corresponding subframe for a Physical Downlink Control Channel (PDCCH), that is, an L1/L2 control channel.
- PDCCH Physical Downlink Control Channel
- TTI Transmission Time Interval
- new radio access technology new RAT, NR
- 5G new radio access technology
- next-generation communication As more and more communication devices require greater communication capacity, a need for improved mobile broadband communication compared to conventional radio access technology (RAT) has emerged.
- massive machine type communications MTC
- MTC massive machine type communications
- communication system design considering reliability and latency-sensitive services/terminals is being discussed.
- next-generation wireless access technologies considering enhanced mobile broadband communication, massive MTC, URLLC (Ultra-Reliable and Low Latency Communication), etc. is being discussed, and in the present invention, for convenience, the corresponding technology is called new RAT, NR or 5G.
- NG-RAN New Generation Radio Access Network
- an NG-RAN may include a gNB and/or an eNB that provides user plane and control plane protocol termination to a UE.
- 4 illustrates a case including only gNB.
- gNB and eNB are connected to each other through an Xn interface.
- the gNB and the eNB are connected to a 5G Core Network (5GC) through an NG interface.
- 5GC 5G Core Network
- AMF access and mobility management function
- UPF user plane function
- Figure 6 illustrates the functional split between NG-RAN and 5GC.
- the gNB provides inter-cell radio resource management (Inter Cell RRM), radio bearer management (RB control), connection mobility control (Connection Mobility Control), radio admission control (Radio Admission Control), measurement setup and provision. (Measurement configuration & provision) and dynamic resource allocation.
- AMF can provide functions such as NAS security and idle state mobility handling.
- UPF may provide functions such as mobility anchoring and PDU processing.
- Session Management Function (SMF) may provide functions such as terminal IP address allocation and PDU session control.
- FIG. 7 is a diagram showing another example of a wireless communication system to which the technical features of the present invention can be applied.
- FIG. 7 illustrates a system architecture based on a 5G new radio access technology (NR) system.
- An entity used in the 5G NR system (hereinafter, simply referred to as “NR”) may absorb some or all functions of entities introduced in FIG. 2 (e.g., eNB, MME, S-GW).
- An entity used in the NR system may be identified with the name "NG" to distinguish it from LTE.
- 3GPP TS 38 series (3GPP TS 38.211, 38.212, 38.213, 38.214, 38.331, etc.) to help understand the description below.
- the wireless communication system includes one or more UEs 11, a next-generation RAN (NG-RAN), and a 5th generation core network (5GC).
- NG-RAN consists of at least one NG-RAN node.
- An NG-RAN node is an entity corresponding to the BS 20 shown in FIG. 2 .
- An NG-RAN node consists of at least one gNB 21 and/or at least one ng-eNB 22.
- the gNB 21 provides termination of the NR user plane and control plane protocols towards the UE 11 .
- Ng-eNB 22 provides termination of E-UTRA user plane and control plane protocols towards UE 11 .
- 5GC includes access and mobility management function (AMF), user plane function (UPF) and session management function (SMF).
- AMF hosts functions such as NAS security, idle state mobility handling, and more.
- AMF is an entity that includes the functions of a conventional MME.
- UPF hosts functions such as mobility anchoring and protocol data unit (PDU) processing.
- PDU protocol data unit
- a UPF is an entity that includes the functions of a conventional S-GW.
- the SMF hosts functions such as UE IP address allocation and PDU session control.
- the gNB and ng-eNB are interconnected through the Xn interface. gNB and ng-eNB are also connected to 5GC through NG interface. More specifically, it is connected to the AMF through the NG-C interface and to the UPF through the NG-U interface.
- FIG. 8 is a diagram showing another example of a wireless communication system to which the technical features of the present invention can be applied. Specifically, FIG. 8 shows a system architecture based on an LTE system.
- An entity used in NR may absorb some or all functions of entities introduced in FIG. 5 (eg, gNB, AMF, UPF).
- An entity used in the LTE system may be identified with the name "EN" to distinguish it from NR.
- the wireless communication system includes one or more UEs 11, E-UTRAN and EPC.
- E-UTRAN consists of at least one E-UTRAN node.
- the E-UTRAN node is an entity corresponding to the BS 20 shown in FIG. 2 .
- An E-UTRAN node consists of at least one en-gNB 23 and/or at least one eNB 20.
- the en-gNB 23 provides termination of the NR user plane and control plane protocols towards the UE 11 .
- the eNB 20 provides termination of the E-UTRAN user plane and control plane protocols towards the UE 11 .
- EPC includes MME and S-GW.
- the en-gNB and eNB are interconnected through the X2 interface.
- the en-gNB and eNB are connected to the EPC through the S1 interface. More specifically, it is connected to the MME and/or S-GW via the S1-U and/or S1 interface.
- the three main requirements areas of 5G are (1) enhanced mobile broadband (eMBB) area, (2) massive machine type communication (mMTC) area, and ( 3) It includes the ultra-reliable and low latency communications (URLLC) area.
- eMBB enhanced mobile broadband
- mMTC massive machine type communication
- URLLC ultra-reliable and low latency communications
- Some use cases may require multiple areas for optimization, while other use cases may focus on just one key performance indicator (KPI).
- KPI key performance indicator
- eMBB focuses on overall improvements in data rate, latency, user density, capacity and coverage of mobile broadband access.
- eMBB targets a throughput of around 10 Gbps.
- eMBB goes far beyond basic mobile Internet access, and covers rich interactive work, media and entertainment applications in the cloud or augmented reality.
- Data is one of the key drivers of 5G, and we may not see dedicated voice services for the first time in the 5G era.
- voice is expected to be handled simply as an application using the data connection provided by the communication system.
- the main causes of the increased traffic volume are the increase in content size and the increase in the number of applications requiring high data rates.
- Streaming services audio and video
- interactive video and mobile internet connections will become more widely used as more devices connect to the internet.
- Cloud storage and applications are rapidly growing in mobile communication platforms, which can be applied to both work and entertainment.
- Cloud storage is a particular use case driving the growth of uplink data rates.
- 5G is also used for remote work in the cloud, requiring much lower end-to-end latency to maintain a good user experience when tactile interfaces are used.
- cloud gaming and video streaming are other key factors driving the demand for mobile broadband capabilities.
- Entertainment is essential on smartphones and tablets everywhere, including in highly mobile environments such as trains, cars and planes.
- Another use case is augmented reality for entertainment and information retrieval.
- augmented reality requires very low latency and instantaneous amount of data.
- mMTC is designed to enable communication between high-volume, low-cost devices powered by batteries, and is intended to support applications such as smart metering, logistics, field and body sensors.
- mMTC targets 10 years of batteries and/or 1 million devices per km 2 .
- mMTC enables seamless connectivity of embedded sensors in all fields and is one of the most anticipated 5G use cases. Potentially, IoT devices are predicted to reach 20.4 billion by 2020.
- Industrial IoT is one area where 5G is playing a key role enabling smart cities, asset tracking, smart utilities, agriculture and security infrastructure.
- 5G can complement fiber-to-the-home (FTTH) and cable-based broadband (or DOCSIS) as a means of delivering streams rated at hundreds of megabits per second to gigabits per second.
- FTTH fiber-to-the-home
- DOCSIS cable-based broadband
- Such high speeds may be required to deliver TV at resolutions of 4K and beyond (6K, 8K and beyond) as well as virtual reality (VR) and augmented reality (AR).
- VR and AR applications include almost immersive sports events. Certain applications may require special network settings. For example, in the case of VR games, game companies may need to integrate their core servers with the network operator's edge network servers to minimize latency.
- the next step will be remotely controlled or self-driving vehicles. This requires very reliable and very fast communication between different autonomous vehicles and/or between vehicles and infrastructure. In the future, autonomous vehicles will perform all driving activities, leaving drivers to focus only on traffic anomalies that the vehicle itself cannot identify. The technological requirements of autonomous vehicles require ultra-low latency and ultra-high reliability to increase traffic safety to levels that humans cannot achieve.
- Smart cities and smart homes will be embedded with high-density wireless sensor networks.
- a distributed network of intelligent sensors will identify conditions for cost- and energy-efficient maintenance of a city or home.
- a similar setup can be done for each household.
- Temperature sensors, window and heating controllers, burglar alarms and appliances are all connected wirelessly. Many of these sensors typically require low data rates, low power and low cost.
- real-time HD video for example, may be required in certain types of devices for surveillance.
- Machine learning refers to the field of defining various problems dealt with in the field of artificial intelligence and studying methodologies to solve them. do. Machine learning is also defined as an algorithm that improves the performance of a certain task through constant experience.
- An artificial neural network is a model used in machine learning, and may refer to an overall model that has problem-solving capabilities and is composed of artificial neurons (nodes) that form a network by synaptic coupling.
- An artificial neural network can be defined by a connection pattern between neurons in different layers, a learning process for updating model parameters, and an activation function for generating output values.
- An artificial neural network may include an input layer, an output layer, and optionally one or more hidden layers. Each layer may include one or more neurons, and the artificial neural network may include neurons and synapses connecting the neurons. In an artificial neural network, each neuron may output a function value of an activation function for input signals, weights, and biases input through a synapse.
- Model parameters refer to parameters determined through learning, and include weights of synaptic connections and biases of neurons.
- hyperparameters mean parameters that must be set before learning in a machine learning algorithm, and include a learning rate, number of iterations, mini-batch size, initialization function, and the like.
- the purpose of learning an artificial neural network can be seen as determining model parameters that minimize the loss function.
- the loss function may be used as an index for determining optimal model parameters in the learning process of an artificial neural network.
- Machine learning can be classified into supervised learning, unsupervised learning, and reinforcement learning according to learning methods.
- Supervised learning refers to a method of training an artificial neural network given a label for training data, and a label is the correct answer (or result value) that the artificial neural network must infer when learning data is input to the artificial neural network.
- Unsupervised learning may refer to a method of training an artificial neural network in a state in which a label for training data is not given.
- Reinforcement learning may refer to a learning method in which an agent defined in an environment learns to select an action or action sequence that maximizes a cumulative reward in each state.
- machine learning implemented as a deep neural network (DNN) including a plurality of hidden layers is also called deep learning, and deep learning is a part of machine learning.
- DNN deep neural network
- machine learning is used to include deep learning.
- a robot may refer to a machine that automatically processes or operates a given task based on its own abilities.
- a robot having a function of recognizing an environment and performing an operation based on self-determination may be referred to as an intelligent robot.
- the robot may perform various physical operations such as moving a robot joint by having a driving unit including an actuator or a motor.
- the movable robot includes wheels, brakes, propellers, and the like in the driving unit, and can run on the ground or fly in the air through the driving unit.
- Autonomous driving refers to a technology that drives by itself, and an autonomous vehicle refers to a vehicle that travels without a user's manipulation or with a user's minimal manipulation.
- autonomous driving includes technology that maintains the driving lane, technology that automatically adjusts speed, such as adaptive cruise control, technology that automatically drives along a set route, technology that automatically sets a route when a destination is set, and so on. All of these can be included.
- a vehicle includes a vehicle having only an internal combustion engine, a hybrid vehicle having both an internal combustion engine and an electric motor, and an electric vehicle having only an electric motor, and may include not only automobiles but also trains and motorcycles.
- the self-driving vehicle may be regarded as a robot having an autonomous driving function.
- Extended reality is a generic term for virtual reality (VR), augmented reality (AR), and mixed reality (MR).
- VR technology provides only CG images of objects or backgrounds in the real world
- AR technology provides CG images created virtually on top of images of real objects
- MR technology provides a computer that mixes and combines virtual objects in the real world. It is a graphic technique.
- MR technology is similar to AR technology in that it shows real and virtual objects together. However, there is a difference in that virtual objects are used to supplement real objects in AR technology, whereas virtual objects and real objects are used with equal characteristics in MR technology.
- HMD Head-Mount Display
- HUD Head-Up Display
- mobile phones tablet PCs, laptops, desktops, TVs, digital signage, etc.
- a wireless network may be configured by a network security architecture.
- the network security architecture may include at least one network monitoring function (NMF).
- NMF may be implemented by a deep packet inspection (DPI) function deployed in a network node or a dedicated DPI network node.
- DPI deep packet inspection
- NMF can be divided into NMSF and NMCF according to the node where the function is located. That is, NMSF may be a kind of server as a network node, and may be implemented in the form of a module or function in another server.
- NMCF itself may be a type of terminal or IoT device, or may be implemented in the form of a module or function in another terminal or IoT device.
- NMCF is stored as software in a chip or memory of a terminal and may perform an operation of monitoring security or performance of a terminal (or client node).
- a network security architecture including such NMSF and NMCF can be applied to various networks such as LTE, 5G, and 5G NPN disclosed in this specification.
- entities within a radio access network (RAN) or entities within a core network may be equipped with NMSFs, and user terminals may be equipped with NMCFs.
- a specific protocol is defined between the NMSF and the NMCF so that signals related to performance or security can be exchanged. That is, if the network is equipped with NMSF and NMCF, the network operator can monitor various security and performance problems occurring on the communication path between network nodes and end user terminals, and accordingly, various services provided based on the type of network (i.e. 5G URLLC service) can be efficiently provided.
- 5G URLLC service i.e. 5G URLLC service
- Active RTT inspection refers to a method of forcibly transmitting a packet for connecting to a network for RTT inspection. That is, the NMCF actively transmits packets for RTT checking periodically or non-periodically, so that the NMSF can check RTT based on the corresponding packet.
- the network security architecture according to the present embodiment is applied to the network.
- the first scenario is for a network that provides a relatively open service
- the second scenario is for a network that provides a network connect oriented service that is strongly closed, such as a disaster network.
- the NMCF can be integrated into the terminals connected to the network to monitor the security of the terminal, and the NMSF exists as a separate node in the network and mirrors the packets flowing on the network path through L3 switching and secures the network. can be monitored.
- the NMSF since the NMSF is assigned an IP and can directly connect to the network, the NMCF and the NMSF can directly exchange security-related information, whereas in the second scenario, the NMSF is an external device and allocates an IP. Since it is not received, it is not possible to directly connect to the network. Therefore, in the second scenario, the NMSF cannot directly receive the security-related packets of the NMCF and cannot directly issue security-related instructions to the NMCF.
- FIG. 10 is a diagram for explaining a method of performing network security monitoring based on a security check packet according to an embodiment according to a first scenario.
- a terminal integrated with NMCF performs security monitoring of the terminal, generates a security check packet indicating a security monitoring result, and transmits it to the network.
- NMSF since NMSF is assigned its own IP, the destination of the security packet in the network may be NMSF. That is, NMSF can directly receive the security check packet from NMCF.
- the security monitoring of the terminal is exemplarily an operation of monitoring the system log file of the terminal, an operation of determining whether an access attempt to the terminal occurs from an IP other than the allowed IP included in the white list, and an operation of analyzing packet information about the terminal. , It may include at least a part of an operation of analyzing state information of the terminal and an operation of obtaining alive information indicating whether connection to the terminal is possible.
- the operation of monitoring the system log file of the terminal may include a process of determining that a security problem has occurred when a login attempt is made to the terminal from a disallowed IP.
- the operation of monitoring the system log file of the terminal may include a process of determining that a security problem has occurred when an operation of an unknown process occurs in the terminal.
- the operation of monitoring the system log file of the terminal may include a process of determining that a security problem has occurred when login failures occur more than a predetermined number of times during a predetermined period of time.
- the operation of analyzing state information of the terminal may include a process of determining that a security problem has occurred when internal information of the terminal is equal to or greater than a preset threshold.
- the internal information may be, for example, CPU usage or memory usage of the terminal.
- the operation of analyzing state information of the terminal may include a process of determining that a security problem has occurred when an event in which an additional medium is connected or disconnected from the terminal occurs.
- the operation of obtaining Alive information is based on at least one of a determination that access to the terminal is impossible for a period of time longer than a predetermined threshold, and a determination that the device IP does not exist in ARP (Address Resolution Protocol).
- a process of determining that a security problem has occurred may be included.
- the terminal If it is determined that a security problem has occurred as described above, the terminal (or NMCF) generates a security check packet indicating a security monitoring result.
- Security check packets may be generated and transmitted periodically or aperiodically.
- 11 is a security packet structure according to the first scenario.
- the security check packet is in a TCP packet format and includes a TCP header and a TCP payload.
- the TCP payload may include a user ID (UID) field, a length field, and a monitoring result field.
- UID user ID
- the UID field, the length field, and the monitoring result field may be defined as shown in Table 1 below.
- the UID field is 4 bytes and indicates the user ID or identification information of the terminal
- the length field is 2 bytes and indicates the byte length of the monitoring result field that follows the length field
- the monitoring result field is 2 bytes. Indicates security monitoring results (alive information of the terminal, CPU usage, memory usage, etc.).
- the NMSF upon receiving the security check packet from the NMCF, the NMSF checks the security monitoring result of the terminal based on the security check packet, and the RTT for the section (including the wireless section and the network section) passed through by the security check packet. inspection can be performed. That is, the security inspection packet itself not only provides the result of security monitoring of the terminal, but also can be used to perform security monitoring for the network section as an intermediate packet of the active RTT inspection.
- the NMCF attempts a TCP connection using a 3-way handshaking procedure for transmission of the security check packet, and transmits the security check packet to the NMSF.
- NMSF performs the RTT check using the 3-way handshaking procedure performed for the transmission of the security check packet.
- NMSF may perform an RTT check at each corresponding period or time point. That is, the NMSF recognizes in advance at least at what period or time point the NMCF will transmit the security check packet, and performs the RTT check using a 3-way handshaking procedure accompanying the transmission of the security check packet. At this time, the NMSF can perform the RTT check by mirroring the signals exchanged in the 3-way handshaking procedure.
- NMSF receives the data part from which the TCP header is removed from the security check packet, identifies from which terminal (or which NMCF) the security check packet was transmitted through the UID, and monitors the result according to the specific length indicated by the length field.
- the field is decrypted, and it is possible to check whether a security problem occurs in the terminal from the decrypted monitoring result field.
- FIG. 12 is a diagram for explaining a method of performing network security monitoring based on a security check packet according to an embodiment according to a second scenario.
- a terminal integrated with NMCF performs security monitoring of the terminal, generates a security check packet indicating a security monitoring result, and transmits it to the network.
- the destination of the security packet in the network may be a server other than NMSF. That is, NMSF cannot directly receive the security check packet from NMCF.
- the security monitoring of the terminal is exemplarily an operation of monitoring the system log file of the terminal, an operation of determining whether an access attempt to the terminal occurs from an IP other than the allowed IP included in the white list, and an operation of analyzing packet information about the terminal. , It may include at least a part of an operation of analyzing state information of the terminal and an operation of obtaining alive information indicating whether connection to the terminal is possible.
- the operation of monitoring the system log file of the terminal may include a process of determining that a security problem has occurred when a login attempt is made to the terminal from a disallowed IP.
- the operation of monitoring the system log file of the terminal may include a process of determining that a security problem has occurred when an operation of an unknown process occurs in the terminal.
- the operation of monitoring the system log file of the terminal may include a process of determining that a security problem has occurred when login failures occur more than a predetermined number of times during a predetermined period of time.
- the operation of analyzing state information of the terminal may include a process of determining that a security problem has occurred when internal information of the terminal is equal to or greater than a preset threshold.
- the internal information may be, for example, CPU usage or memory usage of the terminal.
- the operation of obtaining Alive information is based on at least one of a determination that access to the terminal is impossible for a period of time longer than a predetermined threshold, and a determination that the device IP does not exist in ARP (Address Resolution Protocol).
- a process of determining that a security problem has occurred may be included.
- the terminal If it is determined that a security problem has occurred as described above, the terminal (or NMCF) generates a security check packet indicating a security monitoring result.
- Security check packets may be generated and transmitted periodically or aperiodically.
- 13 is a security packet structure according to the second scenario.
- the UID field is 4 bytes and indicates the user ID or identification information of the terminal
- the length field is 2 bytes and indicates the byte length of the monitoring result field that follows the length field
- the monitoring result field is 2 bytes. Indicates security monitoring results (alive information of the terminal, CPU usage, memory usage, etc.).
- the NMSF since the NMSF cannot directly receive a security check packet, it can perform an RTT check on a section (including a wireless section and a network section) through which the security check packet passes.
- the NMCF attempts a TCP connection using a 3-way handshaking procedure to transmit the security check packet, and transmits the security check packet to the server.
- NMSF performs RTT check by using 3-way handshaking procedure for transmission of security check packet between NMCF and server.
- NMSF may perform an RTT check at each corresponding period or time point. That is, the NMSF recognizes in advance at least at what period or time point the NMCF will transmit the security check packet, and performs the RTT check using a 3-way handshaking procedure accompanying the transmission of the security check packet.
- the NMSF can perform the RTT check by mirroring the signals exchanged in the 3-way handshaking procedure.
- NMCF and NMSF may be configured to selectively perform either one of the embodiment according to the first scenario and the embodiment according to the second scenario, or may be configured to perform both.
- NMCF and NMSF may support a first mode operating in an embodiment according to the first scenario and a second mode operating in an embodiment according to the second scenario.
- NMCF and NMSF may adaptively change modes according to network conditions.
- the NMSF may be configured to operate in the second mode before being allocated an IP, and to operate in the second mode after being allocated an IP.
- FIG. 14 is a diagram showing another example of a wireless communication system to which the technical features of the present invention can be applied.
- FIG. 14 shows a system architecture based on a 5G non-public network (NPN) system.
- NPN non-public network
- 3GPP TS 22.261 NPN is called a private network and can be used to build a private network of a company and can be implemented in various configurations using virtual and physical elements of a 5G communication system.
- the NPN may exist as a completely independent network, may be hosted by the PLMN, or may be provided in the form of a slice of the PLMN.
- NPN may be called by various other names such as enterprise business network, enterprise private network, corporate private network, government business network, government private network, government private network, smart factory private network, and smart city private network.
- 5G NPN is designed for high quality service requirements, high security requirements using dedicated security credentials, security/privacy/performance/safety assurance and isolation from public 5G networks to prevent malfunctions. desirable.
- 5G technology is used to build 5G vertical services based on real-time IoT devices in smart factories and smart cities using URLLC, a requirement of 5G.
- 5G vertical services are implemented as 5G NPNs
- 5G NPNs must satisfy 5G requirements in terms of security and performance when processing time-sensitive data of IoT devices.
- 5G NPN may include RAN and 5GC.
- a 5G NPN may be assigned an ID (NPN ID) for identification with other NPNs.
- Multiple service providers (SPs) SP#1, SP#2, and SP#N send URLLC packets to each UE (UE#A, UE#B) that are capped or connected to 5G NPN. service can be provided.
- the 5G NPN security architecture can provide vertical services that satisfy URLLC requirements by effectively removing threats from inside or outside the network and minimizing the risks accordingly.
- 15 is a 5G NPN security architecture providing a network security monitoring function according to an example.
- NMCF as a module may be configured as an integrated form of a terminal (or client node) constituting a 5G NPN.
- NMCF is stored as software in a chip or memory of a terminal and may perform an operation of monitoring security or performance of a terminal (or client node).
- NMSF can be configured as an integrated form (integrated) to a specific network node in the computing set constituting the 5G NPN.
- the NMSF may be configured as a form integrated into multiple-access edge computing (MEC), which is a computing set, or at least one node (eg, a server node) within the MEC.
- MEC multiple-access edge computing
- the NMSF is stored as software in a chip or memory in the at least one node, and may perform an operation of monitoring security or performance of the 5G NPN through packets of the N6 interface input and output from the at least one node.
- MEC is a technology that alleviates congestion in the core network and creates new local services by deploying various services and caching contents close to user terminals by applying distributed cloud computing technology.
- the NMCF can be fused with a user terminal, in particular an IoT device, to communicate with a gNB.
- Mounting NMCF on IoT devices is one of the effective means to ensure security and URLLC performance in 5G NPN.
- NMCF can be implemented in software and can be called endpoint detection and response (EDR entity or micro engine (ME)).
- EDR entity or micro engine (ME)
- ME micro engine
- Terminals are wirelessly connected to gNBs. Each terminal transmits packets to or receives packets from gNBs.
- the gNBs are connected to the 5G core network or via the N3 interface (or GTP tunnel). can be connected to the local network via the network, where packets flow through the N3 interface.
- 16 is a 5G NPN security architecture providing a network security monitoring function according to another example.
- the NMCF may be configured as a module and integrated into a terminal (or client node) constituting a 5G NPN.
- NMCF is stored as software in a chip or memory of a terminal and may perform an operation of monitoring security or performance of a terminal (or client node).
- NMSF is an independent network node constituting 5G NPN, and can be configured separately from other network nodes or entities.
- NMSF can be configured as an independent network node separate from UPF or MEC.
- the NMSF is coupled to the input or output of the UPF (eg N3 interface) or coupled to the input or output of the MEC to monitor the security or performance of the 5G NPN through packets of the N3 interface.
- the 5G NPN security architecture may further include a switch device branching the N3 interface to mirror packets of the N3 interface.
- NMCF and NMSF can communicate with each other through the N3 interface, for example, to share security-related signals such as monitoring results in NMCF, and the sharing of security-related signals is based on the IP designated for NMSF. can do.
- security-related signals such as monitoring results in NMCF
- the sharing of security-related signals is based on the IP designated for NMSF. can do.
- NMSF may be configured at a point where packets decrypted from the node are output.
- 17 is a 5G NPN security architecture providing a network security monitoring function according to another example. 17 is different from FIGS. 15 and 16 in that a plurality of NMSFs are configured in one 5G NPN.
- the NMCF may be configured as a module and integrated into a terminal (or client node) constituting a 5G NPN.
- NMCF is stored as software in a chip or memory of a terminal and may perform an operation of monitoring security or performance of a terminal (or client node).
- the second NMSF is an independent network node constituting the 5G NPN, and may be configured separately from other network nodes or entities.
- the second NMSF may be configured as an independent network node separate from the UPF or MEC.
- the second NMSF can be coupled to the input or output of the UPF to monitor the security or performance of the 5G NPN through packets of the N3 interface.
- the 5G NPN security architecture may further include a switch device branching the N3 interface to mirror packets of the N3 interface.
- the NMCF and the first NMSF and/or the second NMSF may communicate with each other through, for example, an N3 interface to share security-related signals such as monitoring results in the NMCF. and/or an IP designated for the second NMSF.
- an N3 interface to share security-related signals such as monitoring results in the NMCF. and/or an IP designated for the second NMSF.
- the first and/or second NMSFs may be configured at a point where packets decrypted from the node are output.
- NMSFs and NMCFs are deployed in various forms within the 5G NPN.
- the 5G NPN security architectures according to FIGS. 15 to 17 are not mutually exclusive, and may be implemented as one or a combination of two or more depending on network characteristics and costs.
- embodiments in which NMSF and NMCF are deployed within 5G NPN may be derived in various ways other than FIGS. 15 to 17, and for example, NMSFs may be fused to other network entities or network nodes unrelated to UPF and/or MEC. Of course there is.
- NMSF is configured to perform at least one of the following functions.
- the NMSF performs a function of obtaining at least one mirrored packet by mirroring packets transmitted and received between the client node and the server node.
- the client node may be, for example, a user terminal or an IoT device.
- Packet mirroring is a technique that collects and analyzes packets exchanged in a specific node in real time.
- the NMSF may further include a switching function or a switching device for branching connection lines between nodes for packet mirroring.
- the NMSF performs a function of determining an abnormal operation or security problem that threatens the security and performance of the 5G NPN based on the information included in the mirrored packet.
- NMSF performs an alerting function for abnormal operations that interfere with URLLC requirements based on security and performance monitoring results.
- NMSF When an abnormal operation that threatens security or performance is detected, NMSF notifies the user so that the user can properly respond to the abnormal operation.
- NMSF also sends alerting information to the security controller.
- the notification information is information instructing the security controller to take action against the abnormal operation, and the security controller receiving the notification information performs an operation to recover the abnormal operation (for example, shutting down the network).
- Notification information may be transmitted through the N3 interface (or GTP tunnel) provided by the 3GPP signaling protocol.
- the NMCF is configured to perform at least one of the following functions.
- the NMCF performs a function of collecting packets or internal information transmitted and received by client nodes on the network.
- the NMCF performs an operation of monitoring and determining a network security threat associated with a client node based on the collected packets or internal information.
- the NMCF performs an operation of notifying the result of monitoring network security threats to NMSF using an IP designated for NMSF.
- the NMCF may display an alert on an abnormal terminal operation to the user of the IoT device.
- NMCF operates using computing resources of individual client nodes or IoT devices, and resources that do not affect the basic performance and functions of individual client nodes or IoT devices. use the amount of
- NMCF can detect abnormal behavior through data generated by client nodes or IoT devices, it can more accurately determine the security status of client nodes or IoT devices compared to NMSF. Furthermore, when the number of IoT terminals connected to 5G NPN increases exponentially, monitoring all data flows is a heavy burden on NMSF, so it is effective to monitor the security and performance of 5G NPN in collaboration with NMCF. Security and performance monitoring by the NMSF is essential because the NMCF fused to the client node or the IoT device may stop working due to a problem with the client node or the IoT device itself (eg, power shutdown).
- the following embodiment relates to a method for calculating a network performance indicator according to packet mirroring and packet analysis by NMSF.
- the NMSF will be expressed as a network monitoring device.
- user terminals 910 - 1 to 910 - 3 access a specific web site and/or web application through a network 920 .
- the user terminals 910-1 to 910-3 may be portable terminals, robots, IoT devices (eg, sensors) on the 5G network. Access is performed at the server end 930 to 950 associated with the web site and/or web application.
- the user terminals 910 - 1 to 910 - 3 access a specific web page through a web browser and request execution of a desired page or application.
- the request may include not only static content such as an html document, but also multimedia content such as video and audio, and/or execution of other applications.
- the user terminals 910-1 to 910-3 are arbitrary devices operated by the user and including communication functions (including Internet access and web browser execution functions) and data processing functions.
- the user terminals 910-1 to 910-3 include a mobile station (MS), a user equipment (or user terminal) (UE), a user terminal (UT), a wireless terminal, an access terminal (AT), Terminal, fixed or mobile subscriber unit, subscriber station (SS), cellular telephone, wireless device, wireless communication device, wireless transmit/receive unit (WTRU), mobile node , mobile, mobile station, personal digital assistant (PDA), smartphone, laptop, netbook, personal computer, wireless sensor, consumer electronics (CE), robot, IoT device, or other terms.
- MS mobile station
- UE user equipment
- UT user terminal
- AT access terminal
- AT fixed or mobile subscriber unit
- SS subscriber station
- cellular telephone wireless device
- wireless communication device wireless transmit/receive unit
- WTRU wireless transmit/receive unit
- mobile node mobile, mobile station, personal digital
- Various embodiments of the user terminals 910-1 to 910-3 include a cellular phone, a smart phone with a wireless communication function, a personal digital assistant (PDA) with a wireless communication function, a wireless modem, a portable computer with a wireless communication function, A photographing device such as a digital camera having a wireless communication function, a gaming device having a wireless communication function, a music storage and playback home appliance having a wireless communication function, and an Internet home appliance capable of wireless Internet access and browsing, as well as integrating combinations of such functions. It may include portable units or terminals that are being used, but are not limited thereto.
- Each user terminal 910-1 to 910-3 includes input devices such as a mouse and keyboard for receiving user input and a display for providing a control user interface for the user to interact with networked devices. It may include a user communication interface.
- the user interface may include a graphical user interface (GUI) to provide information to the user.
- GUI graphical user interface
- Networks 920 include wired and/or wireless networks.
- the network 920 may include the Internet, and may include a 5G Stand Alone (SA) system, a 5G Non-Stand Alone (NSA), and/or a 4G system.
- the network 920 may include a serial bus that provides a physical layer (medium) to transmit and receive data between variously connected user terminals 910-1 to 910-3 and server ends 930 to 950.
- the serial bus may include a 1394 serial bus. This may support both time-multiplexed audio/video (A/V) streams and standard IP (Internet Protocol) communication (eg, IETF REC 2734), but is not necessarily limited thereto. .
- A/V audio/video
- IP Internet Protocol
- Networks 920 may also include non-1394 networks (eg, Ethernet, etc.). Also, network 920 may include a home network. Each of the user terminals 910 - 1 to 910 - 3 may communicate with one or more server devices 930 to 950 in the network 920 .
- Server stages 930 to 950 respond to users' requests by using network 920 resources to provide services to users. Although it is expressed as a server stage (930 to 950), it does not necessarily have to be a server related to a specific website. It may be a single server device.
- the term “server” refers to another entity that communicates with a specific user terminal 910-1 to 910-3, a target entity requested for communication by the user terminal 910-1 to 910-3, and a user. It may mean a controller device (a central control device that controls a robot or IoT device, etc.) that controls the terminals 910-1 to 910-3, and/or a base station (eNB, gNB, etc.).
- Server stages 930 to 950 return information (data) in response to requests from user terminals 910-1 to 910-3. It also includes the performance of a function (e.g., a mechanical function) and return of state, the return of data stream and state, the acceptance of data stream and return of state, or the storage of state for various actions. Server stages 930 to 950 may include custom, built-in, and control programs to implement control of their own hardware.
- a function e.g., a mechanical function
- Server stages 930 to 950 may include custom, built-in, and control programs to implement control of their own hardware.
- the server stages 930 to 950 may be associated with a specific web site and/or web application, and perform calculations and management related to work performed in each web site and/or web application. Server stages 930 to 950 may interact with user terminals 910 - 1 to 910 - 3 and other servers 930 to 950 . Exemplary services may include MPEG sourcing/sinking, and display services.
- Server stages 930 to 950 provide interface data (e.g., HTML, XML, Java, JavaScript, GIF, JPEG, MPEG, graphic rupture or intended information in any other format used for the purpose).
- interface data e.g., HTML, XML, Java, JavaScript, GIF, JPEG, MPEG, graphic rupture or intended information in any other format used for the purpose.
- each of the servers 930 - 950 may process information such as one or more Hypertext Markup Language (HTML) that provides command and control of the device.
- HTML Hypertext Markup Language
- the server stages 930 to 950 may use Internet standards representing HTML pages using a browser technique.
- the server stages 930 to 950 may include a web server 930, an app server 940: APP server, and a database server 950: DB server.
- the server side does not necessarily have to consist of only a combination of three servers. It is effective that only the web server 930 exists and the app server 940 and database server 950 do not exist, or it is possible to configure only one app server 940, and other combinations of servers in various forms and layers are also possible. It is possible.
- the web server 930 is a server that provides requested content to web clients.
- the web server 930 may provide images such as static HTML, JPEG, or GIF to a web browser through an HTTP protocol.
- the web server 930 may also embed a container capable of operating an internal application.
- the app server 940 may also be called a web application server (WAS) server, and represents a middleware software server that provides transaction processing and management and an application execution environment in a client/server environment.
- WAS web application server
- the server stages 930 to 950 may be built as a three-tier web computing environment of a web server, an application server, and a database.
- the app server 940 plays the same role as an application server in a client/server environment.
- the app server 940 provides an application execution environment and a database access function, manages transactions, performs business logic for processing tasks, and interoperates applications between different types of systems.
- effective distribution can be induced through functional classification of the web server 930 and the WAS 940 .
- Static data can be structurally processed by the web server 930 existing in front, and dynamic data can be processed by WAS 940 in the back.
- static data such as HTML, JavaScript files, CSS, images, etc. are located and processed in the web server 930 at the front stage for the user's request, so that the service request does not pass to the WAS 940.
- the WAS 940 can focus on performing the web application.
- a method of processing what is to be processed by the web server 930 and what is to be handed over to the WAS 940 can be processed through configuration of the web server 930 .
- the web server 230 handles whether to transfer specific extensions or directory tasks to the WAS 940 .
- the database server 950 is a storage in which various data handled by the web server 930 and/or the app server 940 are stored.
- the database server 950 may store a huge amount of data related to the work processed by the web server 930 and/or the app server 940, depending on the nature of the web site or web application. This may include personal information, organization information, and data related to various contents (eg, multimedia contents).
- the network monitoring device 900 may be disposed in at least one of the network 920 and the web server 930, between the web server 930 and the app server 940, and between the app server 940 and the database server 950.
- the network monitoring device 900 is disposed in at least one of between the network 920 and the web server 930, between the web server 930 and the app server 940, and between the app server 940 and the database server 950. It is connected to a switching device (not shown) and diagnoses the performance of a network service based on packets mirroring packets transmitted and received between two entities.
- mirrored packets can be generated by copying based on actually transmitted/received packets (actually used user traffic)
- separate artificial test packets can be generated to diagnose the performance of network services. no need.
- the network monitoring device 900 can monitor all packets in real time.
- the network monitoring device 900 is based on various information included in the mirrored packet (eg, source ID (source id), destination ID (destination id) and time information (time), input port information, output port information, etc.) It calculates various indicators representing the performance of network services in real time. Calculation of indicators may be performed in units of transactions. The calculated indicators may exceed 120, which will be described in detail with reference to FIG. 12 below. Based on the calculated indicators, the network monitoring device 900 determines for each section whether there are problems such as speed delay, waiting delay, traffic excess, and error occurrence in which section, and allows the operator or manager to check the determination result. Visualize. That is, the error section is quickly identified, and based on this, a response to the error section can be quickly made.
- problems such as speed delay, waiting delay, traffic excess, and error occurrence in which section, and allows the operator or manager to check the determination result. Visualize. That is, the error section is quickly identified, and based on this, a response to the error section can be quickly made.
- the network monitoring device 900 can analyze mirrored packets to track access from malicious users (related to security issues), and respond to them in real time.
- FIG. 19 is a block diagram illustrating a connection configuration between a network monitoring device and other devices in a network according to an embodiment of the present invention.
- a router 1022 is connected to a network such as the Internet 1020, and the router 1022 is connected to a switch 1024 so that servers 1030- 1 to 1030-3), and transmits information related to a response to the request from the first to third entities 1030-1 to 1030-3 to the user terminal.
- the first to third entities 1030-1 to 1030-3 may be different servers.
- the first to third entities 1030-1 to 1030-3 may be different user terminals when viewed from the client side, and packets for communication between user terminals also pass through the switch 1024.
- the network monitoring device 1000 may analyze packet-related information by mirroring it.
- the router 1022 or a sharing device (not shown) having a routing function extracts the location and destination of a packet transmitted from a user terminal through the Internet 1020, designates an optimal route to the location, and follows the route. Forward data packets to switch 1024. Router 1022 identifies the IP address and forwards the data to switch 1024.
- the switch 1024 stores the unique MAC addresses of the servers 1030-1 to 1030-3, and through these addresses, which packets must be transmitted to where. and transmits the packet provided from the router 1022 to the corresponding servers 1030-1 to 1030-3.
- the switch 1024 includes switches that serve as OSI layer 2, OSI layer 3, OSI layer 4, and/or other layers (eg, OSI layer 7). For example, a function of setting a route may be performed. In addition, functions such as load balancing, port forwarding, and QoS may be performed.
- Switch 1024 may be referred to as a network switch, a switching hub, a port switching hub, or the like.
- the network monitoring device 1000 is connected to the switch 1024 and acquires almost all packets provided to the servers 1030-1 to 1030-3 through the switch 1024 by mirroring them. Packet mirroring, i.e., duplication or capture of packets, may be performed at switch 1024. In some cases, it may be performed in the network monitoring device 1000 itself.
- the switch 1024 copies the packets provided to the servers 1030-1 to 1030-3, sets the port connected to the network monitoring device 1000 as a destination port, and transfers the packet to the network monitoring device 1000. can provide In this case, the corresponding port may be designated and provided for analysis.
- 20 is a conceptual diagram for explaining the operation of each section of the network monitoring device according to an embodiment of the present invention.
- the user terminal 1110 transmits packets to the server terminals 1130, 1140, and 1150 through the Internet 1120, and at this time, the Internet 1120 and A router 1122 and a switch 1124 exist between the servers 1130, and the network monitoring device 1100 is connected to the switch 1124.
- the network monitoring device 1100 may analyze the mirrored packets to check the perceived latency of the user in the user terminal 1110 .
- information related to traffic up to the first server 1130 through the Internet 1120 can be identified, and response latency in the servers 1130, 1140, and 1150 can also be checked.
- the response waiting time of the server end (1130, 1140, 1150) is determined for each section.
- Response waiting times between the web server 1130 and the WAS 1140 and between the WAS 1140 and the DB server 1150 are separately calculated and handled. Web latency and app latency can be calculated separately.
- the web response latency represents the response latency until the static URL (image (gif, png, jpg, etc.), css, js, text, etc.) receives data from the web server 1130
- the app response latency is the response delay time until receiving the first packet of a page generated from a dynamic URL or a POST URL.
- App response latency may be related to dynamic content including query parameters, dynamic content (page) such as HTML, ASP, JSP, PHP, etc., and/or calls using the HTTP POST method. That is, this represents the response waiting time associated with the work returned via the WAS server 1140 and/or the DB server 1150.
- the perceived speed of the user in the user terminal 1110 is identified as a page loading time. This is analyzed and visualized as the perceived speed of each user for each major web page. That is, when a plurality of users access a specific web page, it is possible to determine the experience time of the plurality of users for each user environment and/or region.
- the user environment may be identified differently according to a region, an OS installed in a user terminal, a type of web browser, and a type of terminal.
- the access status and distribution monitoring environment by region can be provided. At this time, the access status by region may be provided by dividing into a global regional status targeting the entire world region and a local regional status targeting the domestic region.
- the current state of actual traffic generation for a user section (network section) up to the server 1130 may be expressed as a network round trip time (RTT). This can also be referred to as network elapsed time.
- RTT network round trip time
- BPS Bit Per Second
- UPS User Per Second
- CPS Connection Per Second
- TPS Transaction Per Second
- user applications can be monitored, and abnormal actions by users can also be analyzed and tracked. Through these performance-related indicators, it is possible to recognize applications occupying network traffic, and to monitor correlations between users, applications, and networks.
- the network monitoring device 1100 can also determine the response delay time between the servers 1130, 1140, and 1150. In other words, it is possible to identify response quality indicators for each server section, including response delay time for each server, number of waiting sessions for each server (wait), indicator for each application URI, and/or indicator for each DB server query (DB Query). can
- the network monitoring device 1200 may include a port 1210, a packet analysis module 1220, a service module 1230, and a user interface 1240. there is. In addition, a packet analysis database 1222 and a service database 1232 may be further included.
- At least one port 1210 may be provided, which is connected to switch devices 1224-1, 1224-2, ....
- One port can be connected to one switch device.
- the connected ports receive mirrored packet information from the switch devices 1224-1, 1224-2, ... and transmit the mirrored packets to the packet analysis module 1220.
- the packet analysis module 1220 collects mirrored packets and substantially analyzes the packets. This may be called an analysis engine.
- the packet analysis module 1220 primarily analyzes the header of the packet in the mirrored packet. Through this, it is distinguished whether it is an HTTP packet, a packet related to a DB, or a packet related to TCP. That is, it distinguishes which protocol the packet is associated with. Through this, you can check to which server the request information such as "GET/web address/HTTP/1.1" was sent.
- the packet analysis module 1220 parses and parses this packet header information. "GET" becomes the request message, and "web address” indicates the web address associated with the request.
- HTTP/1.1 means HTTP 1.1 version
- language information eg, ko-kr
- GET, POST, HEAD, PUT, DELETE, etc. may be transmitted according to the request method, and the packet analysis module 1220 stores this information together with time information and related IP.
- the packet analysis module 1220 assigns an index to each packet, and based on the assigned index, determines which packet it is, whether the corresponding packet is an HTTP-based request packet, or a response packet to it. At this time, a comparative analysis with information obtained from packets received in the past is also performed. That is, when there is a request packet obtained from the first entity, there may be a response packet thereafter from the second entity. At this time, at least two or more packets in time series, packets transmitted and received from the first entity and the second entity Based on this, one session establishment and transaction flows can be analyzed.
- the packet analysis module 1220 may parse which browser the user terminal has used, HOST-related information, previous URL address information, and browser-supported language information. At this time, it is possible to analyze what type of header (general header, request header, or entity header) the header is, and parse information indicating the boundary between the header and the payload.
- the packet analysis module 1220 secondarily analyzes the URL (Uniform Resource Locator) (or URI (uniform resource identifier)), source IP (Source_ip), destination IP (Dest_ip), and time information of the mirrored packet. do.
- URL Uniform Resource Locator
- Source IP Source_ip
- destination IP Destin_ip
- time information of the mirrored packet do.
- the source IP may indicate the IP address of the user terminal
- the destination IP may indicate the IP of a server related to the final destination site of the request.
- opposite information may be indicated.
- Time information may be provided in a timestamp format.
- length information (length) of the entire packet may be checked.
- the packet analysis module 1220 includes packet analysis algorithms corresponding to various protocols, such as HTTP, IP, UDP, TCP, and DNS, and adapts URL, source IP, and Destination IP and time information can be extracted and used for analysis.
- protocols such as HTTP, IP, UDP, TCP, and DNS
- performance index information of about 120 elements per transaction can be generated. Preferably, it analyzes 6000 transactions per second. Then, the extracted packet-related information and about 120 performance indicator information generated per transaction are stored in the database 1222.
- performance-related indicators generated based on packet-related information of mirrored packets will be described in detail.
- the packet analysis module 1220 calculates round-trip arrival time information (RTT information) in units of transactions. That is, the round-trip time information of the data signal is calculated.
- RTT information round-trip arrival time information
- the packet analysis module 1220 generates session information. This may indicate the number of sockets being established per second, i.e., the number of sockets that are connected without disconnecting.
- the packet analysis module 1220 calculates response latency information taken until the user terminal sends a request and receives a response from a specific server. This can be viewed as the latency it takes while querying a database, running an application, or doing other work. Conversely, from the point of view of the user terminal side from the server side, the time before the server sends a request and receives a response from a specific user terminal can be calculated as the response waiting time.
- the packet analysis module 1220 includes BPS information indicating the size of bits transmitted or received per second, Packet Per Second (PPS) information indicating the number of packets transmitted or received per second, and the number of users connected per second (IP standard) to calculate UPS information. This can calculate how many users are connected per second based on the number of source IPs connected to a specific destination IP. In addition, CPS information indicating the number of new sessions connected per second (representing how many sessions are newly connected per second), TPS information indicating the number of transactions occurring per second (representing how many transactions occur per second) yields And, the packet analysis module 1220 calculates Hit Per Second (HPS) information indicating the number of URLs requested per second.
- PPS Packet Per Second
- IP standard IP standard
- the packet analysis module 1220 calculates the HPS based on how many URLs are requested per second from the corresponding server, and in the case of the client HPS, based on how many URLs are requested per second from the corresponding client. to calculate HPS. And, the packet analysis module 1220 calculates SPS (Server Per Second) information, which is information on the number of servers connected per second. This indicates how many servers a client connects to in one second.
- SPS Server Per Second
- the service module 1230 generates statistics based on performance-related indicators stored in the database 1222 . Statistics may be performed on a specific server basis, on a specific user basis, on a URL basis, on a session basis, on a server group located in a specific region, on a client group basis and/or on a web page basis.
- the service module 1230 appropriately visualizes the performance-related index so that the user can intuitively understand the performance of the service according to the current network using various preset visualization tools. Visualization is done based on statistics. That is, a graph or table in a meaningful form can be created by collecting indicators related to specific parameters. For example, a list of sessions created in a specific time period associated with a specific client or server is created, or a table for database queries generated at that time is created.
- the service module 1230 uses a desired time or desired environment (eg, a specific web browser type or specific user terminal type (whether mobile or PC)) You can search and search based on criteria variables such as The service module 1230 may generate visualization information in an appropriate form by classifying desired data based on the selected reference variable.
- a desired time or desired environment eg, a specific web browser type or specific user terminal type (whether mobile or PC)
- You can search and search based on criteria variables such as The service module 1230 may generate visualization information in an appropriate form by classifying desired data based on the selected reference variable.
- the service module 1230 may perform an alarm function of finding and displaying a problematic part in a network service. For example, when the number of waits is greater than or equal to a threshold value, it is determined that there is a problem with the response speed of the corresponding section, and that there is a problem in the corresponding section can be visually displayed.
- the warning means according to the occurrence of a problem may be implemented in a form of transmitting a text message or a warning signal to a related user terminal, in addition to visually expressing differently. This will be described in more detail with reference to FIG. 19 .
- Various statistical data generated by the service module 1230, visualization information data, information related to the visualization tool, and various threshold information set by the user are stored in the service database 1232, and the user can use the user interface 1240 as desired. When requesting processed information of, the corresponding information can be returned.
- the user interface 1240 includes a device that receives various inputs from an operator and outputs visualized information such as a graph or table generated by the service module 1230 .
- This may include input means such as a mouse, keyboard, and touch pad, and output means such as a monitor and a touch screen.
- the user can access information about the server (e.g., server name, server IP, related URL, port, sort number, server location information, processable IP area, etc.), a database associated with it, and connection relationships (links) between various servers. ) and UX/UI database information including a visualization tool for outputting to a user and/or metadata related to visualization.
- a rule set for determining the occurrence of a problem and various setting values related to the rule set may be input.
- DTAF Data Traffic Analysis Function refers to NMSF when NMSF is applied to a network configuration specialized for corporate or government business networks.
- the user equipment may include NMCF.
- corporate business networks or government business networks may be implemented with the aforementioned 5G NPN.
- systems, devices and components described in the embodiments may include, for example, a processor, a controller, an arithmetic logic unit (ALU), a digital signal processor, a microcomputer, a field programmable array (FPA) ), programmable logic unit (PLU), microprocessor, or any other device capable of executing and responding to instructions.
- a processing device may run an operating system (OS) and one or more software applications running on the operating system.
- a processing device may also access, store, manipulate, process, and generate data in response to execution of software.
- the processing device includes a plurality of processing elements and/or a plurality of types of processing elements. It can be seen that it can include.
- a processing device may include a plurality of processors or a processor and a controller. Other processing configurations are also possible, such as parallel processors.
- Software may include a computer program, code, instructions, or a combination of one or more of the foregoing, which configures a processing device to operate as desired or processes independently or collectively. You can command the device.
- Software and/or data may be any tangible machine, component, physical device, virtual equipment, computer storage medium or device, intended to be interpreted by or provide instructions or data to a processing device. , or may be permanently or temporarily embodied in a transmitted signal wave.
- Software may be distributed on networked computer systems and stored or executed in a distributed manner.
- Software and data may be stored on one or more computer readable media.
- the method according to the embodiments may be implemented in the form of program instructions that can be executed through various computer means and recorded on a computer readable medium.
- the computer readable medium may include program instructions, data files, data structures, etc. alone or in combination.
- Program commands recorded on the medium may be specially designed and configured for the embodiment or may be known and usable to those skilled in computer software.
- Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks and magnetic tapes, optical media such as CD-ROMs and DVDs, and magnetic media such as floptical disks.
- - includes hardware devices specially configured to store and execute program instructions, such as magneto-optical media, and ROM, RAM, flash memory, and the like.
- program instructions include high-level language codes that can be executed by a computer using an interpreter, as well as machine language codes such as those produced by a compiler.
- the hardware devices described above may be configured to operate as one or more software modules to perform the operations of the embodiments, and vice versa.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Environmental & Geological Engineering (AREA)
- Data Mining & Analysis (AREA)
- Technology Law (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Field | Byte length | Description |
UID | 4 | This field indicates a user ID of UE |
Length | 2 | This field indicates the byte length of the monitoring result field |
Monitoring Result | Variable | This field indicates alive information, CPU usage and memory usage of UE |
Field | Byte length | Description |
UID | 4 | This field indicates a user ID of UE |
Length | 2 | This field indicates the byte length of the monitoring result field |
Monitoring Result | Variable | This field indicates alive information, CPU usage and memory usage of UE |
Claims (25)
- 네트워크 모니터링 장치에 의해 수행되는 네트워크 보안 모니터링 방법에 있어서,클라이언트 단말의 상태를 모니터링하는 단계;상기 모니터링의 결과에 기초하여 생성된 보안 검사 패킷을 네트워크로부터 획득하는 단계, 상기 보안 검사 패킷은 상기 클라이언트 단말의 UID(user ID) 정보, 길이 정보, 및 모니터링 결과 정보를 포함함;네트워크 스위칭 장치에서 미러링(mirroring)된 미러링 패킷을 네트워크로부터 획득하는 단계; 및상기 보안 검사 패킷과 상기 미러링 패킷 중 적어도 하나에 기초하여 상기 네트워크에 대한 보안 모니터링을 실행하는 단계; 를 포함하는, 방법.
- 제 1 항에 있어서,상기 네트워크에 대한 보안 모니터링은, 상기 네트워크 상에서 IP 주소를 할당 받은 네트워크 모니터링 장치에 의해 실행되고,상기 보안 검사 패킷을 네트워크로부터 획득하는 단계는, 상기 네트워크 모니터링 장치가 상기 IP 주소를 이용하여 상기 보안 검사 패킷을 수신하는 단계를 포함하는, 방법.
- 제 2 항에 있어서,상기 보안 검사 패킷은, TCP 헤더와 TCP 페이로드를 적어도 포함하는 TCP 패킷 포맷이고, 상기 TCP 페이로드는 UID 필드, 길이 필드, 및 모니터링 결과 필드 중 적어도 하나의 필드 정보를 포함하는, 방법.
- 제 1 항에 있어서,상기 네트워크에 대한 보안 모니터링은, 상기 네트워크 상에서 IP 주소를 할당 받지 않은 네트워크 모니터링 장치에 의해 실행되고,상기 보안 검사 패킷을 네트워크로부터 획득하는 단계는, 상기 네트워크 모니터링 장치가 상기 네트워크 상 경로에 대한 감시를 통하여 상기 보안 검사 패킷을 획득하는 단계를 포함하는, 방법.
- 제 4 항에 있어서,상기 보안 검사 패킷은, UDP 헤더와 UDP 페이로드를 적어도 포함하는 UDP 패킷 포맷이고, 상기 UDP 페이로드는 UID 필드, 길이 필드, 및 모니터링 결과 필드 중 적어도 하나의 필드 정보를 포함하는, 방법.
- 제 1 항에 있어서,상기 UID 정보는 상기 클라이언트 단말 또는 상기 클라이언트 단말의 상태를 모니터링하는 클라이언트 모니터링 장치 중 적어도 하나를 고유하게 식별하기 위한 정보이고,상기 길이 정보는 상기 모니터링 결과 정보의 길이를 나타내는 정보이고,상기 모니터링 결과 정보는 상기 클라이언트 단말의 상태를 모니터링한 결과를 나타내는 정보인, 방법.
- 제 1 항에 있어서,상기 보안 검사 패킷은, 상기 클라이언트 단말에 통합된(integrated) 클라이언트 모니터링 장치로부터 생성되는 것을 특징으로 하는, 방법.
- 제 1 항에 있어서,상기 네트워크에 대한 보안 모니터링은, 상기 네트워크에 연결된 독립적인 네트워크 노드, 상기 네트워크상 평면의 입력 또는 출력단, 또는 상기 네트워크 상의 패킷의 목적지인 서버 중 적어도 하나에 위치하여 동작하는 네트워크 모니터링 장치에 의하여 실행되는 것을 특징으로 하는, 방법.
- 제 8 항에 있어서,상기 네트워크 모니터링 장치는, 상기 네트워크에 둘 이상 위치하여 동작하는 것을 특징으로 하는, 방법.
- 제 1 항에 있어서,상기 네트워크 스위치는 OSI 2 계층, OSI 3계층, OSI 4계층, 또는 OSI 7계층 중 어느 하나의 계층에서 패킷을 미러링하도록 구성되는, 방법.
- 제 1 항에 있어서,상기 보안 패킷은, 단말의 시스템 로그 파일을 감시하는 동작, 화이트 리스트에 포함된 허용된 IP 이외의 IP로부터 단말에 접근 시도가 발생하는지 판단하는 동작, 단말에 대한 패킷 정보를 분석하는 동작, 및 단말의 상태 정보를 분석하는 동작 및 단말에 대한 연결 가능 여부를 나타내는 얼라이브 정보를 획득하는 동작 중 적어도 하나의 동작에 의해 상기 클라이언트 단말에 보안 문제가 발생한 것으로 판단되어 생성된 것인, 방법.
- 제 1 항에 있어서,상기 네트워크에 대한 보안 모니터링을 실행하는 단계는, HTTP, IP, UDP, TCP, 및 DNS 중 적어도 하나의 프로토콜에 대응하는 패킷 분석 알고리즘을 활용하는 단계를 포함하고,상기 패킷 분석 알고리즘은, 상기 각 프로토콜에 적응적인 방법으로 상기 미러링된 패킷으로부터 URL, 소스 IP, 목적지 IP, 및 시간정보 중 적어도 하나의 정보를 추출하여 상기 미러링된 패킷을 분석하도록 구성되고, 상기 미러링된 패킷으로부터 사용자 단말에서의 사용자 체감 지연시간, 인터넷을 통한 최초 서버까지의 트래픽, 서버 측의 각 구간별 응답 대기 시간(latency), 웹 응답 대시 시간, 앱 응답 대기 시간, 서버들 간의 응답 지연 시간, 서버별 응답 지연 시간, 서버별 응답 대기 세션수(wait), 어플리케이션 URI별 지표, 및 DB 서버의 쿼리(DB Query)별 지표 중 적어도 하나를 판단하도록 구성되는, 방법.
- 제 12 항에 있어서,상기 네트워크에 대한 보안 모니터링의 결과를 시각화하여 표시하는 단계를 더 포함하고,상기 시각화는, 의미 있는 형태의 그래프의 생성, 테이블의 생성, 및 플로우 맵(flow map)의 생성 중 적어도 하나의 시각화 방법을 이용하여 현재 네트워크의 성능에 관련된 지표 중 적어도 하나의 통계를 포함하는 정보를 시각화하는 것을 의미하는, 방법.
- 클라이언트 단말을 모니터링하는 모니터링 장치에 있어서,클라이언트 단말에 대한 보안 모니터링을 실행하여 모니터링 결과 정보를 생성하고;상기 보안 모니터링의 결과에 기초하여 상기 클라이언트 단말의 UID(user ID) 정보, 길이 정보, 및 모니터링 결과 정보를 포함하는 보안 검사 패킷을 생성하고; 그리고상기 보안 검사 패킷을 네트워크를 경유하여 전송하도록 구성되는, 장치.
- 제 14 항에 있어서,상기 모니터링 장치는, 단말의 시스템 로그 파일을 감시하는 동작, 화이트 리스트에 포함된 허용된 IP 이외의 IP로부터 단말에 접근 시도가 발생하는지 판단하는 동작, 단말에 대한 패킷 정보를 분석하는 동작, 및 단말의 상태 정보를 분석하는 동작 및 단말에 대한 연결 가능 여부를 나타내는 얼라이브 정보를 획득하는 동작 중 적어도 하나의 동작에 의해 상기 클라이언트 단말에 보안 문제가 발생하였는지 판단하고, 상기 보안 문제가 발생한 것으로 판단되는 경우 상기 보안 검사 패킷을 생성하도록 구성되는, 장치.
- 제 14 항에 있어서,상기 보안 검사 패킷은, TCP 헤더와 TCP 페이로드를 적어도 포함하는 TCP 패킷 포맷이고, 상기 TCP 페이로드는 UID 필드, 길이 필드, 및 모니터링 결과 필드 중 적어도 하나의 필드 정보를 포함하도록 구성되는, 장치.
- 제 14 항에 있어서,상기 보안 검사 패킷은, UDP 헤더와 UDP 페이로드를 적어도 포함하는 UDP 패킷 포맷이고, 상기 UDP 페이로드는 UID 필드, 길이 필드, 및 모니터링 결과 필드 중 적어도 하나의 필드 정보를 포함하도록 구성되는, 장치.
- 제 14 항에 있어서,상기 모니터링 장치는, 상기 클라이언트 단말에 통합되어 동작하는, 장치.
- 네트워크 상의 패킷을 모니터링하는 네트워크 모니터링 장치에 있어서,클라이언트 단말을 모니터링하는 클라이언트 모니터링 장치로부터 송신된 보안 검사 패킷을 획득하고;패킷을 미러링하는 네트워크 스위칭 장치로부터 미러링 패킷을 획득하고; 그리고상기 보안 검사 패킷과 상기 미러링 패킷 중 적어도 하나를 분석하여 상기 네트워크에 대한 보안 모니터링을 실행하도록 구성되는, 장치.
- 제 19 항에 있어서,상기 네트워크 모니터링 장치는 상기 네트워크 상에서 IP 주소를 할당 받고, 상기 IP 주소에 기초하여 TCP 패킷으로서의 보안 검사 패킷을 수신하도록 구성되는, 장치.
- 제 19 항에 있어서,상기 네트워크 모니터링 장치는 상기 네트워크 상에서 IP 주소를 할당 받지 아니하고, 상기 네트워크 상 경로의 패킷을 감시하여 UDP 패킷으로서의 보안 검사 패킷을 획득하도록 구성되는, 장치.
- 제 19 항에 있어서,상기 네트워크 모니터링 장치는, HTTP, IP, UDP, TCP, 및 DNS 중 적어도 하나의 프로토콜에 대응하는 패킷 분석 알고리즘을 포함하고,상기 패킷 분석 알고리즘은, 상기 각 프로토콜에 적응적인 방법으로 상기 미러링된 패킷으로부터 URL, 소스 IP, 목적지 IP, 및 시간정보 중 적어도 하나의 정보를 추출하여 상기 미러링된 패킷을 분석하도록 구성되고, 상기 미러링된 패킷으로부터 사용자 단말에서의 사용자 체감 지연시간, 인터넷을 통한 최초 서버까지의 트래픽, 서버 측의 각 구간별 응답 대기 시간(latency), 웹 응답 대시 시간, 앱 응답 대기 시간, 서버들 간의 응답 지연 시간, 서버별 응답 지연 시간, 서버별 응답 대기 세션수(wait), 어플리케이션 URI별 지표, 및 DB 서버의 쿼리(DB Query)별 지표 중 적어도 하나를 판단하도록 구성되는, 장치.
- 제 22 항에 있어서,상기 네트워크 모니터링 장치는, 상기 네트워크 모니터링 장치의 상기 네트워크에 대한 보안 모니터링 결과를 시각화하는 서비스 모듈에 연결되고,상기 서비스 모듈은, 의미 있는 형태의 그래프의 생성, 테이블의 생성, 및 플로우 맵(flow map)의 생성 중 적어도 하나의 시각화 방법을 이용하여 현재 네트워크의 성능에 관련된 지표 중 적어도 하나의 통계를 포함하는 정보를 시각화하도록 구성되는, 장치.
- 제 19 항에 있어서,상기 네트워크 모니터링 장치는, 상기 네트워크에 연결된 독립적인 네트워크 노드, 상기 네트워크상 평면의 입력 또는 출력단, 또는 상기 네트워크 상의 패킷의 목적지인 서버 중 적어도 하나에 위치하여 동작하는 것을 특징으로 하는, 장치.
- 제 19 항에 있어서,상기 네트워크 모니터링 장치는, 상기 네트워크에 둘 이상 위치하여 동작하는 것을 특징으로 하는, 장치.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/573,985 US20240333726A1 (en) | 2021-06-23 | 2022-06-22 | Network security monitoring device and method based on security packet of terminal |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2021-0081756 | 2021-06-23 | ||
KR20210081756 | 2021-06-23 | ||
KR1020220076140A KR20220170770A (ko) | 2021-06-23 | 2022-06-22 | 단말의 보안 패킷에 기반한 네트워크 보안 모니터링 장치 및 방법 |
KR10-2022-0076140 | 2022-06-22 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022270893A1 true WO2022270893A1 (ko) | 2022-12-29 |
Family
ID=84538481
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2022/008852 WO2022270893A1 (ko) | 2021-06-23 | 2022-06-22 | 단말의 보안 패킷에 기반한 네트워크 보안 모니터링 장치 및 방법 |
Country Status (3)
Country | Link |
---|---|
US (1) | US20240333726A1 (ko) |
KR (1) | KR20220170770A (ko) |
WO (1) | WO2022270893A1 (ko) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117528462A (zh) * | 2024-01-08 | 2024-02-06 | 深圳市智联物联科技有限公司 | 一种多网络组网实现的工业物联网的数据传输方法 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20170096793A (ko) * | 2016-02-17 | 2017-08-25 | 동명대학교산학협력단 | 화이트 리스트를 이용한 에이전트 기반 보안위협 모니터링 시스템 |
KR20180009520A (ko) * | 2016-07-19 | 2018-01-29 | 주식회사 안랩 | 클라이언트 단말의 보안성을 관리하는 보안 관리 장치 및 보안 관리 방법 |
KR20180047935A (ko) * | 2016-11-02 | 2018-05-10 | 주식회사 아이티스테이션 | 지능형 지속위협 환경에서의 통합 보안 시스템 |
KR102163279B1 (ko) * | 2019-09-09 | 2020-10-08 | 주식회사 맥데이타 | 5g 기반의 네트워크 성능 진단 방법, 장치 및 시스템 |
US20200329059A1 (en) * | 2017-12-20 | 2020-10-15 | Cisco Technology, Inc. | Correlating endpoint and network views to identify evasive applications |
-
2022
- 2022-06-22 KR KR1020220076140A patent/KR20220170770A/ko not_active Application Discontinuation
- 2022-06-22 WO PCT/KR2022/008852 patent/WO2022270893A1/ko active Application Filing
- 2022-06-22 US US18/573,985 patent/US20240333726A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20170096793A (ko) * | 2016-02-17 | 2017-08-25 | 동명대학교산학협력단 | 화이트 리스트를 이용한 에이전트 기반 보안위협 모니터링 시스템 |
KR20180009520A (ko) * | 2016-07-19 | 2018-01-29 | 주식회사 안랩 | 클라이언트 단말의 보안성을 관리하는 보안 관리 장치 및 보안 관리 방법 |
KR20180047935A (ko) * | 2016-11-02 | 2018-05-10 | 주식회사 아이티스테이션 | 지능형 지속위협 환경에서의 통합 보안 시스템 |
US20200329059A1 (en) * | 2017-12-20 | 2020-10-15 | Cisco Technology, Inc. | Correlating endpoint and network views to identify evasive applications |
KR102163279B1 (ko) * | 2019-09-09 | 2020-10-08 | 주식회사 맥데이타 | 5g 기반의 네트워크 성능 진단 방법, 장치 및 시스템 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117528462A (zh) * | 2024-01-08 | 2024-02-06 | 深圳市智联物联科技有限公司 | 一种多网络组网实现的工业物联网的数据传输方法 |
CN117528462B (zh) * | 2024-01-08 | 2024-03-22 | 深圳市智联物联科技有限公司 | 一种多网络组网实现的工业物联网的数据传输方法 |
Also Published As
Publication number | Publication date |
---|---|
KR20220170770A (ko) | 2022-12-30 |
US20240333726A1 (en) | 2024-10-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020149650A1 (en) | Method and apparatus for mobility management in wireless communication system | |
WO2020139015A1 (en) | Method and apparatus for mobility management in wireless communication system | |
WO2020027639A1 (ko) | 무선 통신 시스템에서 qos 만족 여부를 표시하는 이동 단말기 | |
WO2020166912A1 (en) | Method and apparatus for lossless uplink data transmission of iab network in a wireless communication system | |
WO2021045339A1 (en) | Method and apparatus for supporting up security for mo-edt in cu-du split in a wireless communication system | |
WO2020149653A1 (en) | Method and apparatus for controlling radio resource for a redundant route for a dual-connecting iab-node in a wireless communication system | |
WO2022086082A1 (en) | Method and apparatus for handling resource collision in wireless communication system | |
WO2020167036A1 (en) | Method and apparatus for failure notification on backhaul link in wireless communication system | |
WO2021251625A1 (en) | Method and apparatus for handling master cell group failure in wireless communication system | |
WO2019245297A1 (en) | Method for selecting bwp and device supporting the same | |
WO2021049783A1 (ko) | 5세대 이동 통신 기반의 네트워크 성능 진단 방법, 장치 및 시스템 | |
WO2020251335A1 (ko) | 무선 통신 시스템에서 단말의 신호 송수신 방법 | |
WO2019245290A1 (en) | Method and apparatus for providing beam related information for connection failure detection in wireless communication system | |
WO2020251314A1 (ko) | 무선 통신 시스템에서 rsu 간의 신호 송수신 방법 | |
WO2019221530A1 (en) | Method and apparatus for discarding data among associated transmission buffers in wireless communication system | |
WO2020032638A1 (en) | Method for performing access control and device supporting the same | |
WO2021194134A1 (en) | Method and apparatus for conditional mobility failure handling in wireless communication system | |
WO2021075841A1 (en) | Method and apparatus for performing communication after mobility in wireless communication system | |
WO2022270893A1 (ko) | 단말의 보안 패킷에 기반한 네트워크 보안 모니터링 장치 및 방법 | |
WO2020197125A1 (en) | Method and apparatus for performing measurement in wireless communication system | |
WO2023282421A1 (en) | Method and apparatus for performing qoe management based on ai model in a wireless communication system | |
WO2021045266A1 (ko) | 데이터를 송수신하는 방법 및 통신 기기 | |
WO2022025737A1 (en) | Method and apparatus for packet duplication in wireless communication system | |
WO2021251685A1 (en) | Method and apparatus for handling secondary cell group failure in wireless communication system | |
WO2021141386A1 (en) | Method and apparatus for mobility execution in wireless communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22828740 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18573985 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 22828740 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 27.05.2024) |