슬라이드 1

Similar documents
PowerPoint 프레젠테이션

Intra_DW_Ch4.PDF

Portal_9iAS.ppt [읽기 전용]

DW 개요.PDF

PowerPoint 프레젠테이션

ecorp-프로젝트제안서작성실무(양식3)

<353020B9DAC3E1BDC42DC5ACB6F3BFECB5E520C4C4C7BBC6C3BFA1BCADC0C720BAB8BEC820B0EDB7C1BBE7C7D7BFA120B0FCC7D120BFACB1B82E687770>

Oracle Apps Day_SEM

ETL_project_best_practice1.ppt

Service-Oriented Architecture Copyright Tmax Soft 2005

FMX M JPG 15MB 320x240 30fps, 160Kbps 11MB View operation,, seek seek Random Access Average Read Sequential Read 12 FMX () 2

ORANGE FOR ORACLE V4.0 INSTALLATION GUIDE (Online Upgrade) ORANGE CONFIGURATION ADMIN O

DIY 챗봇 - LangCon

<30362E20C6EDC1FD2DB0EDBFB5B4EBB4D420BCF6C1A42E687770>

0125_ 워크샵 발표자료_완성.key

PowerPoint 프레젠테이션

Security Overview


Voice Portal using Oracle 9i AS Wireless

001지식백서_4도

±èÇö¿í Ãâ·Â

Domino Designer Portal Development tools Rational Application Developer WebSphere Portlet Factory Workplace Designer Workplace Forms Designer

歯CRM개괄_허순영.PDF

歯I-3_무선통신기반차세대망-조동호.PDF

06_ÀÌÀçÈÆ¿Ü0926

Web Application Hosting in the AWS Cloud Contents 개요 가용성과 확장성이 높은 웹 호스팅은 복잡하고 비용이 많이 드는 사업이 될 수 있습니다. 전통적인 웹 확장 아키텍처는 높은 수준의 안정성을 보장하기 위해 복잡한 솔루션으로 구현

미래 서비스를 위한 스마트 클라우드 모델 수동적으로 웹에 접속을 해야만 요구에 맞는 서비스를 받을 수 있었다. 수동적인 아닌 사용자의 상황에 필요한 정보를 지능적으로 파악 하여 그에 맞는 적합한 서비스 를 제공할 수 새로운 연구 개발이 요구 되고 있다. 이를 위하여,

04-다시_고속철도61~80p

김기남_ATDC2016_160620_[키노트].key

슬라이드 1

Output file

Chap7.PDF

제목 레이아웃

Oracle9i Real Application Clusters

요 약 문 1. 제목 : 개인정보 오남용 유출 2차 피해 최소화 방안 2. 연구의 배경 개인정보란 살아 있는 개인에 관한 정보로서 개인을 알아볼 수 있는 정보로 해당 정보만으로는 특정 개인을 알아볼 수 없더라도 다른 정보와 쉽게 결합하여 알아볼 수 있는 것을 포함한다.

UDP Flooding Attack 공격과 방어

슬라이드 제목 없음

Microsoft PowerPoint - ch03ysk2012.ppt [호환 모드]

Interstage5 SOAP서비스 설정 가이드

#Ȳ¿ë¼®

네트워크 안정성을 지켜줄 최고의 기술과 성능 TrusGuard는 국내 최초의 통합보안솔루션으로서 지난 5년간 약 4천여 고객 사이트에 구축 운영되면서 기술의 안정성과 성능면에서 철저한 시장 검증을 거쳤습니다. 또한 TrusGuard는 단독 기능 또는 복합 기능 구동 시

Model Investor MANDO Portal Site People Customer BIS Supplier C R M PLM ERP MES HRIS S C M KMS Web -Based

MS-SQL SERVER 대비 기능

歯이시홍).PDF

< FC1A4BAB8B9FDC7D D325FC3D6C1BEBABB2E687770>

ISO17025.PDF

Microsoft PowerPoint - XP Style

untitled

본문01

°í¼®ÁÖ Ãâ·Â

歯목차45호.PDF

PowerPoint 프레젠테이션

00내지1번2번

untitled

Backup Exec

15_3oracle

PCServerMgmt7

F1-1(수정).ppt

1217 WebTrafMon II

Page 2 of 6 Here are the rules for conjugating Whether (or not) and If when using a Descriptive Verb. The only difference here from Action Verbs is wh

정보기술응용학회 발표

DBPIA-NURIMEDIA

歯부장

thesis

The Self-Managing Database : Automatic Health Monitoring and Alerting

슬라이드 1

SW¹é¼Ł-³¯°³Æ÷ÇÔÇ¥Áö2013

istay

슬라이드 제목 없음

강의지침서 작성 양식

3. 클라우드 컴퓨팅 상호 운용성 기반의 서비스 평가 방법론 개발.hwp

퍼스널 토이의 조형적 특성에 관한 고찰

solution map_....

CD-RW_Advanced.PDF


dbms_snu.PDF

Output file

1.장인석-ITIL 소개.ppt

<332EC0E5B3B2B0E62E687770>

APOGEE Insight_KR_Base_3P11

example code are examined in this stage The low pressure pressurizer reactor trip module of the Plant Protection System was programmed as subject for

김경재 안현철 지능정보연구제 17 권제 4 호 2011 년 12 월

비식별화 기술 활용 안내서-최종수정.indd

Mstage.PDF



슬라이드 1

PowerPoint 프레젠테이션

6자료집최종(6.8))

11¹Ú´ö±Ô

Journal of Educational Innovation Research 2018, Vol. 28, No. 4, pp DOI: * A S

06_±è¼öö_0323

학습영역의 Taxonomy에 기초한 CD-ROM Title의 효과분석

09권오설_ok.hwp

03.Agile.key

DocsPin_Korean.pages

Microsoft PowerPoint - Smart CRM v4.0_TM 소개_ pptx

CRM Fair 2004

디지털포렌식학회 논문양식

목 차 요약문 I Ⅰ. 연구개요 1 Ⅱ. 특허검색 DB 및시스템조사 5

Transcription:

PENTASEC 2011 Penta Security Systems, Inc. October, 2011 김덕수, dskim@pentasecurity.com

Penta Security Systems - Products No. 1 Web Application Firewall Vendor in Korea (WAPPLES) No. 1 Database Encryption Solution Vendor in Korea (D Amo) Intelligent Web Application Firewall, WAPPLES Leading WAF product in Korea with 50%+ market share. Unique Logic Based Detection Engine Near 0 false positive detection and immunity to unknown attacks Security Compatibility Certification from National Intelligence Service Integrated DB Security, D Amo No.1 Database Encryption Software in Korea since 2004 with 650 customers of all sectors. Runs on Oracle(Enterprise/Standard), MS SQL Server, DB2, ALTIBASE, Tibero and MySQL Supports various security configurations through D Amo SG and D Amo SCP Realization of strong comprehensive DB Security PKI Security Solution, ISSAC The First PKI applied International standard technology in Korea. User authentication is provided through NPKI and GPKI systems Supports web session encryption and user authentication PKI Development Toolkit, SCP Cryptographic Module, CIS Cryptographic function and security service development tool. Supports embedded environment Be able to support from PC to 통합 Mainframe 애플리케이션보안솔루션로드맵 SSO & EAM Solution, ISign The First SSO solution in Korea. Single Sign On (SSO)solution for enterprise security since 2001 Extranet Access Management based on RBAC (Role Based Access Control)

Penta Security Systems - Products User Web Server DB Web Application Security Web-based Security Application Development Toolkit Data Encryption Transaction Protection Entity Authentication Single Sign On Web Application Security Web Application Firewall Prevent Web Attacks Privacy Protection DBMS Security Integrated DBMS Encryption Solution Data Encryption Access Control & Audit

IT System Architecture A P P L I C A T I O N S S Y S T E M S N E T W O R K S

Technologies in each layer E M A I L A P P L I C A T I O N S W E B - B A S E D A P P L I C A T I O N S H O S T - B A S E D A P P L I C A T I O N S C L I E N T S E R V E R A P P L I C A T I O N S N E T W O R K M A N A G E M E N T A P P L I C A T I O N S S E C U R I T Y A P P L I C A T I O N S A P P L I C A T I O N S E R V E R S O P E R A T I N G S Y S T E M S E R V E R S F I L E S E R V E R S W E B S E R V E R S N E T W O R K O P E R A T I N G SY S T E M S M I D D L E W A R E SY S T E M S A T M W A N R O U T E R S S W I T C H E S H U B S

Technologies in each layer E M A I L A P P L I C A T I O N S W E B - B A S E D A P P L I C A T I O N S H O S T - B A S E D A P P L I C A T I O N S C L I E N T S E R V E R A P P L I C A T I O N S N E T W O R K M A N A G E M E N T A P P L I C A T I O N S S E C U R I T Y A P P L I C A T I O N S A P P L I C A T I O N S E R V E R S O P E R A T I N G S Y S T E M S E R V E R S F I L E S E R V E R S W E B S E R V E R S N E T W O R K O P E R A T I N G SY S T E M S M I D D L E W A R E SY S T E M S A T M W A N R O U T E R S S W I T C H E S H U B S Business Application OS, DBMS L2, L3, L4 Switches

Secure IT System! A P P L I C A T I O N S S Y S T E M S N E T W O R K S Security Security Security

Application Security A P P L I C A T I O N S S Y S T E M S N E T W O R K S ISSAC = Integrated Security System based on Advanced Cryptography Security 는통합 (Integration) 을피할수없다! Integration 은 Security 의운명!

Application Security A P P L I C A T I O N S S Y S T E M S DBMS N E T W O R K S Security 는통합 (Integration) 을피할수없다! Integration 은 Security 의운명!

Application Security A P P L I C A T I O N S S Y S T E M S N E T W O R K S Network Connected to Web Servers Security 는통합 (Integration) 을피할수없다! Integration 은 Security 의운명!

Security Trio A P P L I C A T I O N S S Y S T E M S N E T W O R K S

DB 암호화방식 DB 암호화는크게 API, Plug-In, In-Place 세가지방식으로분류됩니다. API Plug-In In-Place Application 에서데이터암복호화수행 적용가능 DB 제한없음 암호화대상데이터와관렦된쿼리모두수정필요 접근제어, 감사기능부재 Application DBMS 에 Plug-In 형식으로암복호화모듈설치 Application 으로부터독립되어쿼리수정최소화 암호화컬럼에대한인덱스지원 암호화, 접근제어, 감사통합보안기능제공 DB 엔짂안에암복호화기능포함 이경우, 접근제어, 감사 기능을지원하기위해서는 별도패키지사용필요 OS 의디스크드라이버수준에서암호화하는제품도있음 보안통합관리의어려움및직관성이떨어짐 Database Database Encryption Agent Select Insert Database Engine Encryption Engine API Plug-In In-Place 완벽한데이터보호를위해서는암호화뿐만이아닌접귺제어, 감사를통한보안통합관리가필요

성능관점에서 DB 암호화 3 요소 설치정상운영성공적인구축 실시간처리 OLTP 초기암호화 배치 DW OLAP

DB 암호화 - API 방식 일종의암호모듈을제공하는방식 Application DBMS 암복호화 API 키관리 API 키관리 API 키관리서버 키관리구현 Application 과의 Integration 구현 Legacy 의경우, 초기암호화는누가?

DB 암호화 - Plug-In 방식 Application 을수정하지않는방식 Application DBMS 암복호화 API Interface Objects 키관리 API 키관리서버 패키지설치 운영방식컨설팅 초기데이터암호화지원

DB 암호화 - Plug-In 방식 Application 수정을하지않는가? Application DBMS 개발자 Code Queries 암복호화 API Interface Objects 키관리 API 키관리서버 Query 도 Application 의일부라고생각함 Limitation 이미 Full-scan 하는 Queries Interface Objects 의 Limitation

요즘의 DB 암호화제품 통합형으로제공 Application DBMS API 방식 암복호화 API 키관리 API DBMS용API 암복호화API Interface Objects 키관리API Plug-in 방식 키관리서버 고객의시스템홖경에맞는적용필요

D Amo Product Line-up API Plug-In In-Place Application Database Select Database Database Engine Encryption Agent Insert Encryption Engine API Plug-In In-Place 완벽한데이터보호를위해서는암호화뿐만이아닌접귺제어, 감사를통한보안통합관리가필요

D Amo Analyzer Searching for columns storing privacy information Searching for important encryption target column, ex. credit card number, social identification number, etc Searching for DB Objects involved in the query optimization after encryption Analyzing traffic characteristics on queries accessing encryption columns

D Amo Analyzer Analysis report on encryption before/after Performance expectation report Recommending optimized queries related to encryption columns

Application Security Application Security Is A Totally Different World Network Security Part of IT Networking Experts Product Focused 1000 s of Copies Signature Based Patch Management Application Security Part of Business Units Software Experts Custom Code Focused 1 Copy of Software No Signatures Prevent infinite variant attacks and unknown attacks Don t let anyone rely on network security techniques to gain application security

Traditional Network Firewalls, IDS/IPS, and Anti-Virus systems do NOT protect the Layer-7 Applications (OSI Network). Gartner

70% of ALL threats are at the Web application layer Gartner

93% of oganizations hacked in the past two years through In secure Web Applications Gartner

88% of companies spend more on coffee than Web app security Ponemom Institute

Why Web Application Firewall Web Application Security thought Solid but Vulnerable Hackers steal e-commerce customer credit card numbers Hackers breached company s network even though patches were up-to-date and defenses in place Patches were up-to-date and defenses were in place A coordinated and sophisticated group of hackers broke in and stole customer s credit card information.

Web Application Attack SQL Injection 웹페이지의로그인창에특정명령어를넣어 가입자들이입력한이름, 주민등록번호등을빼내는방법 초보적인방법으로평가된다 보안을염두에두고사이트를설계해야한다 출처 : http://www.asiae.co.kr/news/view.htm?idxno=2011052310523881295

Web Application Attack

Conventional Approach Key : Positive Security Model 을구현하여 Application-layer Attack 을막는다! 기본아이디어 : 알려지지않은공격을막기위하여공격이아니라고정의된 Application 접속만을통과시키고그이외의접속은차단한다. White List Access Control 을구현하여 Positive Security Model 구현 Conventional Web Application Firewall (WAF) White & Black List Layered Architecture Black List Access Control 과 White List Access Control 를결합한형태로구현 Black List Access Control 은기존의알려짂공격방어를위한 Signature 홗용 White List Access Control 은싞뢰할수있는 Web Application 을등록하여 Positive Security 구현하기위해사용 Conventional WAF Architecture Positive Security Protection from unknown threats and vulnerabilities Negative Security Protection from known threats and vulnerabilities Signatures White List Access Control Black List Access Control Web Application Firewall Engine Pattern Matching Engine Pattern DB

White List & Black List Access Control White List Access Control 의특징 접속유형이등록된정보 (White List) 에포함되어있으면서비스를허용되고, 그이외의유형인경우에는모두차단하는방식 Web Application 에대한정확한 White List 가아닌경우, 웹서비스가차단될수있음 Web Application 변경에맞추어정확한 White List 가수집되도록관리되어야함 Web Application 을정확하고싞속하게반영하여 White List 를만들어내는것이관건 Black List Access Control 의특징 접속유형이등록된정보 (Black List) 에포함되어있으면공격으로판단하고차단하는방식 Black List Access Control 을구현하는대표적인방법은 Pattern Matching Engine 을이용하여 Pattern DB 에등록된 Pattern 들을검사하는방식 공격에대한 Black List 는 Pattern 형태로작성되며, 공격탐지를위한패턴을 Signature 라고부름 Pattern 은공격을정확하게탐지하도록정교하게작성하여등록하여야함 Pattern 은아래와같은 String 형식으로작성되어공격이아닌것에대해서도공격으로오탐하는경우가많음 Pattern 의 Regular Expression 의예 ) "[^\d]531\d[-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{4}[^\d]{1}

The 1 st Generation WAF WAF 의정확한탐지능력은관리자의능력에의해좌우 White List를위한정보를관리자가직접등록하여 Access Control 수행 계속변경되는 Web Application의특성상관리자의운영부담이가중 실질적으로 White List Access Control을사용하지못하고운영되는 WAF이많음 Black List 를위한패턴이 False Positive 를발생시키지않도록고도의최적화된패턴등록및관리필 요 관리자가직접패턴최적화를위한작업수행 숙력된기술자만이 WAF 운영가능 추가적인운영비용을투자하여젂문화된패턴정보를구매하여사용하기도함 1) Signature 에대한최적화및관리에대한컨설팅서비스가입 2) 제조사가제공한 Update Sever 에연결하여사용하기도함 운영비용증가 일반적인 Pattern Matching Engine 의경우 Pattern 의수가 3000~5000 개이상이되면성능에부하발생 1 st Generation Web Application Firewall White List Access Control Matching Engine Application List Learning Register App. Info. Black List Access Control Pattern Matching Engine Pattern DB Updating Signatures Register patterns Admin

The 2 nd Generation WAF White List 생성을위한자동화된모듈채용 White List 관리에대한관리자부담을줄이기위하여자동화모듈보강 Auto-Learning 이아닌 Auto-Mining 개념이기때문에실제적으로관리자의개입을통하여 White List 확정 White List의성격상자동생성될경우, 서비스운영에문제가발생할수있기때문 Daily Updated Web Application 의경우, Auto-Mining 데이터가정확하지않음 Application 변경사항을즉각적으로반영하지못하는경우발생 사용가능한 White List 생성을위해최소 2 주이상의 Auto-Mining 필요 Auto-Mining 된 White List 에대한관리자의수정작업필요 Black List 관리에대한기능은 1st Generation WAF 과큰차이가없음 1 st Generation WAF 의한계점을극복하지못함 2 nd Generation Web Application Firewall White List Access Control Mining App. Info. Automation Matching Engine Application List Learning Confirmation Black List Access Control Pattern Matching Engine Pattern DB Updating Signatures Register patterns Admin

WAPPLES Detection Rules WAPPLES COCEP Engine is composed of 26 detection rules and 1 function. Each rule analyzes and responds against various types of attacks. WAPPLES rules provide easy security policy set-up by just selecting detection level and countermeasure option. 1 Buffer Overflow 10 Invalid HTTP 19 Response Header Filtering 2 Cookie Poisoning 11 Invalid URI 20 SQL Injection 3 Cross Site Script 12 IP Filtering 21 Stealth Commanding 4 Directory Listing 13 Parameter Tampering 22 Suspicious Access 5 Error Handling 14 Privacy File Filtering 23 Unicode Directory Traversal 6 Extension Filtering 15 Privacy Input Filtering 24 URI Access Control 7 File Upload 16 Privacy Output Filtering 25 User Defined 8 Include Injection 17 Request Header Filtering 26 Web Site Defacement 9 Input Contents Filtering 18 Request Method Filtering 27 IP Block IP Block is the function that blocks IP connection by the condition user sets. For example, if a certain attack is detected for a given period, IP Block will be triggered for the source IP address.

Detection Engine s 3 mechanisms WAPPLES Detection Engine is using 3 evaluation mechanisms. Logical analytic engine means a detection engine to carry out an application layer interpretation and verification based on below 3 mechanisms. Evaluation based on Heuristic analysis Evaluation based on Semantic analysis Evaluation based on Pattern Matching WAPPLES 26 detection rules and 1 function(ip Block) can be classified as following. Evaluation based on Heuristic Analysis Evaluation based on Semantic Analysis Evaluation based on Pattern Matching Cross Site Scripting Include Injection Buffer Overflow Directory Listing Cookie Poisoning Invalid HTTP Error Handling IP Block Invalid URI Extension Filtering Parameter Tampering Parameter Tampering File Upload Suspicious Access Privacy File Filtering Input Content Filtering URI Access Control Privacy Input Filtering IP Filtering Privacy Output Filtering Request Header Filtering SQL Injection Stealth Commanding Request Method Filtering Response Header Filtering User Defined Pattern Web Site Defacement Unicode Directory Traversal

Rule Example : SQL Injection Example of how WAPPLES s SQL-parser works Assuming that SQL Injection String is (name= penta or name= security ) and keyword= pentasec WAPPLES s SQL-parser processes it as below to decide whether the string has an intention of attack or not. Parse() Expression() queryterm() and Emit Intersect ( Expression() ) Emit ( Emit ) queryterm() or queryterm() keyword = pentasec Emit equal condition SQL queryterm() If all the final results of each end-node are part of SQL command, then WAPPLES SQLparser recognizes the original string as a SQL command. Emit Union name = Penta name = securit y Emit equal condition SQL Emit equal condition SQL

Example of False-Positive and Misdetection (1/4) Misdetection Example of Signature based Engine In the case that WAF has below signatures, Example of SQL Injection Signature - Below part means substring-searching target. rgxp means a regular expression. - After finding a string of part, rgxp is applied. Signature part="or 'a' = 'a" Signature Name SQL Injection WHERE Statement Manipulation part="or 'a'= 'a" SQL Injection WHERE Statement Manipulation 1 part="or 'a'= 'a" SQL Injection WHERE Statement Manipulation 2 part="or 'a'='a" SQL Injection WHERE Statement Manipulation 3 part="or 'a' ='a" SQL Injection WHERE Statement Manipulation 4 part="or 'a'='a" SQL Injection WHERE Statement Manipulation 5 part="or 'a' ='a" SQL Injection WHERE Statement Manipulation 6 part="or a=a" SQL Injection WHERE Statement Override part="or 1=1" SQL Injection WHERE Statement Override 1 if SQL Injection source is modified from a = a to b = b, the regular expression cannot detect the modified SQL Injection attack.

Example of False-Positive and Misdetection (2/4) False-positive Example of Signature based Engine In the case that WAF has below signatures, Example of SQL Injection Signature Signature part="waitfor", rgxp="[^a-za-z]waitfor\s*delay" Signature Name SQL Injection - Waitfor part="having", rgxp="[^a-za-z]having[^\&]{0,20}=[^\&]{0,20}" SQL Injection - "having" statement injection attampt part="opendatasource", rgxp="select.*from.*opendatasource" SQL Injection - opendatasource if HTTP message includes string having a good time == like below, signature based WAF makes a false positive.

Example of False-Positive and Misdetection (3/4) Signature Sample related to Privacy(Credit Card Number) Filtering Ex) For a credit card number 4254361480110015 4254361480110016 : Detected in spite of invalid card number False-Positive 4254-3614-8011-0015-1234-5678 : Detected in spite of not credit card number False-Positive 4254_3614_8011_0015 : Credit card number, but not in pattern Misdetection Limitation Although Credit Card Number is invalid or even not Credit Card Number, the regular expression filters it. If Credit Card Number s format is changed, it can not detect at all. Signature Signature Name part="349", rgxp="[^\d]349\d[-\.\s\\\/=]?\d{4} Data Leakage: credit card number extraction - 213 - American [-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{3}[^\d]{1}" Express part="422", rgxp="[^\d]422\d[-\.\s\\\/=]?\d{4} Data Leakage: credit card number extraction - 24 - Visa [-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{4}[^\d]{1}" part="423", rgxp="[^\d]423\d[-\.\s\\\/=]?\d{4} Data Leakage: credit card number extraction - 25 - Visa [-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{4}[^\d]{1}" part="424", rgxp="[^\d]424\d[-\.\s\\\/=]?\d{4} Data Leakage: credit card number extraction - 26 - Visa [-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{4}[^\d]{1}" part="425", rgxp="[^\d]425\d[-\.\s\\\/=]?\d{4} Data Leakage: credit card number extraction - 27 - Visa [-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{4}[^\d]{1}" part="299", rgxp="[^\d]299\d[-\.\s\\\/=]?\d{4} Data Leakage: credit card number extraction - 276- Diner's Cl [-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{2}[^\d]{1}" ub / Carte Blanche part="300", rgxp="[^\d]300\d[-\.\s\\\/=]?\d{4} Data Leakage: credit card number extraction - 277- Diner's Cl [-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{2}[^\d]{1}" ub / Carte Blanche

Example of False-Positive and Misdetection (4/4) Signature Sample of Buffer Overflow Attack Attempt If the Buffer Overflow Attack is modified like abcdabcd abcd, the regular expression cannot detect it. Signature is made to cope with some scanners and robots. So, it leads to many misdetection. Limitation It is very difficult to express an infinite number of cases as one pattern. To add many single patterns gives additional system load to web application firewall. Signature Signature Name part="aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa Buffer Overflow Attack Attempt aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaa" part="aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA Buffer Overflow Attack Attempt 1 AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAA" part="bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB Buffer Overflow Attack Attempt 2 BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB" part="cccccccccccccccccccccccccccccccccccccccccc CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Buffer Overflow Attack Attempt 3 CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCCCCCCCCCC" part="ddddddddddddddddddddddddddddddddddddd DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD Buffer Overflow Attack Attempt 4 DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" part="eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE Buffer Overflow Attack Attempt 5 EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE EEEEEEEEEEEEEEEEEEEEEEEEE"

Detection Engine s Advantages Advantages of evaluation mechanisms Heuristic Analysis enables proactive detection ability of unknown attacks by using multicriteria analysis and testing and verification processes. By adopting Heuristic Analysis WAPPLES minimizes false negatives. Semantic Analysis enables detection of modified attacks with a low possibility of false positives by using application layer parsers to verify protocol and syntax. WAPPLES Advantages Higher Security Extremely low possibility of false positive Accurate detection against modified attacks. Higher Performance No additional system load such as inputting new patterns. Generally, more than five thousand (5K) patterns lead to low system performance. No difference in performance in test and production environments. Ease of Use and Less Maintenance Extremely low management support by administrator and low operation cost Does not need signature update service

Cloud Computing Definition Cloud computing is Web-based processing, whereby shared resources, software, and information are provided to computers and other devices (such as smartphones) on demand over the Internet. (Wikipedia) 이기종단말 다양한서비스 표준화된통싞프로토콜 HTTP 단말에독립적인인터페이스 웹브라우저

Cloud Computing Cloud Computing Security Is A No. 1 Issue Cloud computing issues : Security There are lots of issues related to newly-rising cloud computing; Performance, Availability, Integration, and etc. Despite existence of many issues, security sector is the most high-lighted one. The challenges/issues ascribed to the cloud /ondemand model Security Performance 63.1% 74.6% Source: IDC Enterprise Panel, August 2008 Availability 63.1% Hard to integrate with in-house IT 61.1% Not enough ability to customize 55.8% 40% 50% 60% 70% 80%

Virtual WAPPLES Must-have for Trend Cloud Computing Security Web-based cloud computing All businesses(services) based on cloud computing are provided via web: whether it is form of IaaS, PaaS, SaaS Service that satisfies Essential characteristics of Cloud Computing is web(visual Model of NIST Working Definition) Web is the most appropriate and optimized interface to provide cloud computing service It s Web! Cloud Computing Security is Web Application Security Since cloud computing is web-based, its security issues share lots of commons with web application security.

WAPPLES for Cloud

WAPPLES for Cloud

WAPPLES for Cloud

Penta Security Systems - Products User Web Server DB Web Application Security Web-based Security Application Development Toolkit Data Encryption Transaction Protection Entity Authentication Single Sign On Web Application Security Web Application Firewall Prevent Web Attacks Privacy Protection DBMS Security Integrated DBMS Encryption Solution Data Encryption Access Control & Audit

Penta Security Systems - Products User Web Server DB Web Application Security Web-based Security Application Development Toolkit Data Encryption Transaction Protection Entity Authentication Single Sign On Web Application Security Web Application Firewall Security-as-a-Service Prevent Web Attacks Privacy Protection Cloud DBMS Security Integrated DBMS Encryption Solution Data Encryption Access Control & Audit

Thank you Korea(Headquarter) www.pentasecurity.com 20Fl. Hanjin Shipping Bldg., 25-11 Yoido-Dong, Youngdeungpo-Gu, Seoul, Korea Tel: 82-2-780-7728 Fax: 82-2-786-5281 Japan(Branch) www.pentasecurity.co.jp Ascend Akasaka Bldg., 3F. 3-2-8 Akasaka, Minato-ku, Tokyo 107-0052 Japan Tel: 81-3-5573-8191 Fax: 81-3-5573-8193 Copyright 1997-2011 PentaSecurity Systems, Inc. All rights reserved