바로가기메뉴

본문 바로가기 주메뉴 바로가기

ACOMS+ 및 학술지 리포지터리 설명회

  • 한국과학기술정보연구원(KISTI) 서울분원 대회의실(별관 3층)
  • 2024년 07월 03일(수) 13:30
 

사물인터넷 환경에서 시스템에 대한 비정상행위 방지 기법

A Scheme on Anomaly Prevention for Systems in IoT Environment

한국사물인터넷학회논문지 / Journal of The Korea Internet of Things Society, (P)2466-0078;
2019, v.5 no.2, pp.95-101
https://doi.org/https://doi.org/10.20465/kiots.2019.5.2.095
이근호 (백석대학교)
  • 다운로드 수
  • 조회수

초록

4차 산업혁명시대와 사물인터넷의 시대로 접어들면서 다양한 서비스가 빠르게 성장하고 있으며 관련된 다양한연구가 활발히 진행중에 있다. 그중에서도 사물인터넷에서 사용이 되고 있는 다양한 디바이스에 대한 비정상행위에 대한 연구도 진행이 되고 있다. 초연결의 사회에서 하나의 잘못된 디바이스로 인한 피해가 발생하면 다양하게 연결되어있는 시스템에 심각한 영향을 줄 수 밖에 없다. 본 논문에서는 이러한 사물인터넷 환경에서 디바이스에 대한 안전성을높일 수 있는 방법과 안전하게 디바이스와 서비스를 이용하 수 있는 방법에 대하여 안티디버깅 기법, 이상 프로세스탐지 기법, 백도어 탐지 기법 등 여러 가지 비정상적인 행위로 인한 위협요소에 대응하기 위한 기법을 제안한다.

keywords
Internet of Things, System, Anomaly, Device, Threat, Anti-Debugging, Malware, 사물인터넷, 시스템, 비정상행위, 디바이스, 위협, 안티디버깅, 악성코드

Abstract

Entering the era of the 4th Industrial Revolution and the Internet of Things, various services are growing rapidly, and various researches are actively underway. Among them, research on abnormal behaviors on various devices that are being used in the IoT is being conducted. In a hyper-connected society, the damage caused by one wrong device can have a serious impact on the various connected systems. In this paper, We propose a technique to cope with the problem that the threats caused by various abnormal behaviors such as anti-debugging scheme, anomalous process detection method and back door detection method on how to increase the safety of the device and how to use the device and service safely in such IoT environment.

keywords
Internet of Things, System, Anomaly, Device, Threat, Anti-Debugging, Malware, 사물인터넷, 시스템, 비정상행위, 디바이스, 위협, 안티디버깅, 악성코드

참고문헌

1.

J.W.Park and Y.S,Park, “An automatic detection scheme of anti-debugging routines to the environment for analysis,” Proc. Control Conference, p.2, 2014.

2.

H.M.Kwak, T.H.Lee, G.N.Kim, J.W.Cho and K.H.Lee, “A Scheme for Avoidance through Anti-debugging Program”, The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.55-57, 2019.

3.

p3ngdump's study blog. p3ngdump, June. 15. 2016, "https://p3ngdump.tistory.com/56".

4.

H.N.Kim, “Real-time hybrid analysis based on multiple profile for prevention of malware,”Hongik University Graduate School: Department of Information Security, 2014.

5.

JH.Choi, K.H.Lee and S.H.Yun, “Abnormal Process Detection Using Blockchain”, The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.67-68, 2019.

6.

E.G.Hong, S.J.Lee and S.H.Seo, “Blockchain Technology Trends for the Internet of Things“, Journal of Information Security, Vol.9, No.1, pp.38-46, 2018.

7.

J.H.Choi, K.H.Lee and S.H.Yun, “Abnormal Process Detection Using Blockchain”, The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.67-68, 2019.

8.

H.Y.Kim, “Analysis of Security Threats and Countermeasures on Blockchain Platforms,” Korean Institute of Information Technology, Vol.16, No.5, pp.103-112, 2018.

9.

H.J.Chu, I.H.Song and B.G.Choi, “A Decentralized Test Management Tool Based on Blockchain Technique,”The Korean Institute of Information Scientists and Engineers, Vol.25, No.7, pp.321-328, 2019.

10.

J.H.Hong, K.H.Lee and S.H.Yun, “A Scheme for ECU Application Technique using Blockchain”, The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.34-35, 2019.

11.

T.Hardjono and N.Smith. ”Cloud-based commissioning of constrained devices using permissioned blockchains.“ IoTPTS '16 Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security. ACM, 2016.

12.

J.H.Yang and K.H.Lee, “A Scheme for Application of Internet of Things and Blockchain Technology”, The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.75-76, 2019.

13.

J.T.Kim, J.H.Kho, M.S.Hong, C.W Son, B.Park, D.W.Lee and G.Lee “A Study on Intrusion Protection Techniques against Linux Kernel Backdoor”, The Journal of The Institute of Webcasting, Internet Television and Telecommunication, Vol.9, No.3, pp.201-207, 2009.

14.

S.J.Park, G.S.Go, J.H.Cho and, K.H.Lee, “A Scheme for Anomaly Process Detection Using Blockchain”, The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.24-25, 2019.

15.

Wikipedia, “chkrootkit”, https://ko.wikipedia.org/wIki /Chkrootkit

16.

J.H.Hong, J.W.Kim, C.J.Kim and, K.H.Lee, “Security Techniques for Various Hacking Using Kali-Linux”, The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.61-62, 2019.

한국사물인터넷학회논문지