280 likes | 559 Views
System and Policy in Korea on cyber attacks. 2011.11.28 Jeong Min, Lee KISA. Contents. Korea Cyber Security Framework DDoS Response System Security Monitoring Center Detection Tools DNS Sinkhole Cyber Cure System for Infected PCs DDoS Cyber Shelter DDoS Response Case :
E N D
System and Policy in Koreaon cyber attacks 2011.11.28 Jeong Min, Lee KISA
Contents • Korea Cyber Security Framework • DDoS Response System • Security Monitoring Center • Detection Tools • DNS Sinkhole • Cyber Cure System for Infected PCs • DDoSCyber Shelter • DDoS Response Case : • 3.4 DDoS in 2011
Cyber Crisis Response Framework President National Center For Crisis Management Ministry of National Defense Korea Communications Commission National Intelligence Service Defense Security Command KrCERT/CC KNCERT/CC Military Area/each unit Critical Infrastructures in Private Sector Critical Infrastructures in Government/Public Sector
DDoS Nation Wide Anti-DDoS System A ISP B ISP IxRuter IX Router IX(Internet eXchange) Connected Connected DDoS Detection system DDoS Detection system Block or Detour Block or Detour Backbone Router DDoS Attack Traffic DDoS Attack Traffic Normal Traffic Normal Traffic IDC, Internet Biz company, Internet Service Provides, etc IDC, Internet Biz company, Internet Service Provides, etc DDoS Attack Traffic Legitimate Traffic
Web Hacking Malicious Code Detection (MC-Finder) KISA ISP Web Service Provider SKBroadband MaliciousCode Finding System (MC-Finder) 1. Update detection rule • Check hidden malicious URL in website All Domains registered in Korea (1.8 million) KT T Broad MalicioiusURL (Dissemination, Route) 3.Request to block foreign malicious URL 4.Request to remove malicious URL Staff on duty
Cyber Cure System for Infected PCs Target website Cyber cure system Stop! Cure zombie PC DDoS attack 2.Operate cyber cure System 1.Collect infected PC IP Zombie PC ISP Download dedicated vaccine 3.Popup window for notification 4. Dedicated vaccine ISP ISP
Case Study :Success Story of KR DDoSattack countermeasure by KISA
Overview of 3.4 DDoS(1) • 2011.3.4~ 3.15(about 10 days) • Attack Target : 40 institutions • 24 Government and Public institutions • 9 Financial institutions • 7 Portal & Shopping Mall
March DDoS Method is more Intelligent and destructive than July • 3.4 DDoS Attack attempted only attack of disturbing the system network with very high technology, so that this attack is deemed as the testing kind’s prior attack for checking Korea’s state of defense. • (Dmitri Alperovitch, vice president of McAfee, DongAIlbo Interview dated on July 9, 2011)
Depending on the response, the attack is continuing to change
DDoS Nation Wide Anti-DDoS System A ISP B ISP IxRuter IX Router IX(Internet eXchange) Connected Connected DDoS Detection system DDoS Detection system Block or Detour Block or Detour Backbone Router DDoS Attack Traffic DDoS Attack Traffic Normal Traffic Normal Traffic IDC, Internet Biz company, Internet Service Provides, etc IDC, Internet Biz company, Internet Service Provides, etc DDoS Attack Traffic Legitimate Traffic
Cyber Cure System for Infected PCs Target website Cyber cure system Stop! Cure zombie PC DDoS attack 2.Operate cyber cure System 1.Collect infected PC IP Zombie PC ISP Download dedicated vaccine 3.Popup window for notification 4. Dedicated vaccine ISP ISP
Q&A jmlee@kisa.or.kr