46
ETRI Development Development of Network Security Technology of Network Security Technology 2001. 9. 25. Information Security Technology Division Information Security Technology Division

Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI

Development Development of Network Security Technologyof Network Security Technology

2001. 9. 25.

Information Security Technology Division Information Security Technology Division

Page 2: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 2

IntroIntro--ductionsductions

MarketMarketTrendsTrends

ProblemDefinition

SecureNetworking

Tech.

Details ofNetworkSecurity

Tech.

ContentsContents

Page 3: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 3

? Can be easily intercepted by monitoring transmission line ? Can be easily monitored and controlled by attackers? Can be possible to disable networks by service disruption attacks

Security VulnerabilitiesSecurity VulnerabilitiesSecurity Vulnerabilities

Anti-Cyber Terror should be necessary!

Everything over Internet !But ...

Security should be necessary!

Internet ParadigmInternet Paradigm

Page 4: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 4

64158

572

1,943

256 276379

572

0

400

800

1200

1600

2000

1997년 1998년 1999년 2000년

해킹사고

신종바이러스

Cyber Terrors ?Cyber Terrors ?

LAN

. . . .A CBSNIFFING !

Internet

접속점

감시

감시

감시

Internet

시스템 마비 /붕괴 코드 배포라우터 스위치

ISP 1Mail Worm

ISP 2

공격

공격

Page 5: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 5

Problems Problems

? Service disruption of E-commerce ? Exposure of network routing data? Misusage of personal information ? Privacy Infringement? Network disruption

Internet

디지탈 음성 샘플의 가공,새로운 문장 생성 신분 위장을

통한 범죄

인터넷 전화 트래픽 인터넷 전화처리 장비

정보유출

인터넷 전화처리 장비

Internet

라우터

해킹

위장, 구매

청구

해킹

Page 6: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 6

Cyber Terror TechnologyCyber Terror Technology

? Multiple-attacks through networks ? Redirect attacks? Attacks against server and PC? Domestic hacking by foreigners? Attacks by using information security technology? System breakdown / decrease of network performance

TrendsTrendsTrends

Host & network security should be necessary!

Page 7: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 7

Host Security Host Security vs vs Network SecurityNetwork Security

Host Security - mature- relatively secure

Network Security- beginning - relatively non-secure

Page 8: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 8

2002

2005

- High secure algorithm- Intrusion detection- Intrusion protection- LAN/host security

- Web security- E-mail security

- High speed algorithm- IPsec- ESM- Security policy-based

- Secure OS- Secure IC card

- QoS Security- Information warfare- Active security- Optical Security

- Multicast security- Electronic voting

Integrated Security

Individual Security

Intelligent Active Security

Growth o

f next

generat

ion inte

rnet

Current in

ternet

Beginni

ng of n

ext

genera

tion int

ernet

Network Security EvolutionNetwork Security Evolution

Page 9: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 9

※ Datamonitor, 1999

0% 10% 20% 30% 40% 50%

20%

40%

60%

80%

100%C

AG

R

Market Share

= 1998 value($M)

= 2003 value($M)

Anti-Virus

PKICA

Security management

VPNFirewall

Authentication

Algorithm

Market of AntiMarket of Anti--Cyber Terror productsCyber Terror products

Page 10: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 10

Products (1)Products (1)

? For protection of internal networks of company, bank…? Firewall-I(CheckPoint), Gauntlet(TIS)

? 수호신(Securesoft), Secureworks(어울림)

FirewallFirewallFirewall

IDS (Intrusion Detection System)IDS (Intrusion Detection System)IDS (Intrusion Detection System)

? For risk analysis and system security? Omniguard(Axent), RealSecure(ISS)

? Siren(pentasecurity), Neowatcher(Inzen)

Page 11: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 11

Products (2)Products (2)

? PKI-based Authentication : Cyber Banking, EC? VeriSign, CyberTrust

? TrustPro(SDS), ASSURE(Senextech)

CA (Certificate Authority)CA (Certificate Authority)CA (Certificate Authority)

? Norton Antivirus(Symantec), PC-Cillin(Trans)

? V3Pro(안철수), ViRobot(Hauri)

Anti-VirusAntiAnti--VirusVirus

Page 12: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 12

Products (3)Products (3)

? Major network security system? Cisco1700series(Cisco), VPN-1(CheckPoint)

? Secuwaysuite(Future System)

VPN (Virtual Private Network) VPN (Virtual Private Network) VPN (Virtual Private Network)

? Increase of integrated security service

? ESM (Enterprise Security Management)? Security Consulting

Current trendCurrent trendCurrent trend

Page 13: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 13

Evolution of ITEvolution of IT

? Appearance of new security products due to changing IT

environment? Becomes major part of communication system

? Progress toward total security solution

? Increasing importance of network security service

? Passive security -> Active Security

Progress of Security TechnologyProgress of Security TechnologyProgress of Security Technology

? Changing of IT infrastructure due to increasing internet traffic? WDM-based optical network

? Progress toward All IP-based wired & wireless convergent network

? Real feeling service by using BT-IT fusion technology

Progress of IT EnvironmentProgress of IT EnvironmentProgress of IT Environment

Page 14: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 14

Past

IndividualSecurity

- VPN- IDS- Firewall- Anti-Virus

integratedSecurity

- Integrated VPN- ESM- Secure Engine

Present Future

IntelligentActive Security

- Active security- optical security- All IP-based network security

Progress of Network SecurityProgress of Network Security

Local Network Security Internet-based integratedsecurity management

Active security managementfor optical internet-basedwired & wireless convergent network

Page 15: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 15

Problems of Present Security Tech (1)Problems of Present Security Tech (1)

? As security function is placed in network edge point ? Reduction of network performance is occurred

? As real time communication is difficult without secure OS & engine ? Users do not want to use security system

Reduction of network performanceReduction of network performanceReduction of network performance

Page 16: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 16

Problems of Present Security Tech (2)Problems of Present Security Tech (2)

? Security infrastructure needs many security functions? As Individual security system is made for single purpose security function

? The individual systems can not interwork between them

? There are no functional regulations between security systems ? Hard to implement security infrastructure

Hard to implement security infrastructureHard to implement security infrastructureHard to implement security infrastructure

Page 17: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 17

Problems of Present Security Tech (1)Problems of Present Security Tech (1)

? Advanced countries develop CC-based security systems

? To improve international competition and reliability

? In korea, there is no CC-based security system ? Development of CC-based security system is required

No CC-based security systemNo CCNo CC--based security systembased security system

* CC : Common Criteria

CC

Page 18: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 18

Needs of New Security ServiceNeeds of New Security Service

? Security Technology becomes ? Major function of IT system

? Basic service of IT service

? Next generation internet ? Progresses toward All IP-based wired & wireless convergent networks

? Needs secure logical connection based on the convergent networks

? Needs new security service model

? Therefore, logical secure service network must be built by using

Secure Networking and CC-based security service must be provided? Secure Networking for connection between internet nodes is needed to

realize integrated intrusion protection and back-tracing

? CC-based security system is needed to guarantee mutual connection

between some different kinds of systems

Page 19: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 19

능동보안관리 시스템

센서센서 정보를정보를 통한통한 보안시스템간보안시스템간능동능동 보안관리보안관리 서비스서비스 제공제공

Internet3.5G/4G Mobile

Network

4G AAA 서버

보안 노드

가정 가입자

보안 서버

보안 노드

Secure Networking ConceptSecure Networking Concept

Page 20: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 20

Secure Networking Tech. Trend (1)Secure Networking Tech. Trend (1)

? USA invests $67,000,000 in study of security technology(2000) ? HPCC, IT2 projects

? DARPA make a study of new security technology based on active security mechanism

? European Union invests 540,000,000 Euros in study of network security (2000)

Advanced CountriesAdvanced CountriesAdvanced Countries

? Advanced countries have built Common Criteria Mutual RecognitionArrangement(CCMRA) for developing CC-based security systems and make a study of secure networking technology

•HPCC : High Performance Computing & Communication•IT2: Information Technology 2

Page 21: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 21

? ITO of DARPA make a study of secure networking for network security and survivability

? Network Fault-Tolerant Survivability

? Denying Denial-of-Service

? Active Network Response

FTN : Fault Tolerant NetworkAN : Active NetworkDC : Dynamic Coalition

Program

FTN

DC

AN

# of projects

23

21

59

Investment

500M$ (2000~200

4)

-

-

Participants

NAI, Telcordia, Princeton Univ.

Telcordia, Stanford, Xerox Palo Alto

MIT, CMU, NAI, U.Penn

? Research goal

Secure Networking Tech. Trend (2)Secure Networking Tech. Trend (2)

Page 22: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 22

Domestic Research TrendsDomestic Research Trends

? Some security products have got domestic evaluation level which

is not international mutual certification

? There is no CC-based security system

? Secure networking is under technical consideration

DomesticDomesticDomestic

? Some security products have got domestic evaluation level

? No international mutual certification

Page 23: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 23

Secure Networking TechnologySecure Networking Technology

? Policy-based optical internet security management? Active security management? Optical Security? CC-based secure node system

Principal Core TechnologyPrincipal Core TechnologyPrincipal Core Technology

PreventionTolerance Adaptation

Attacks

Secure Node SystemPolicy-based Security Management

Active Security Management

Hacking

Page 24: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 24

Policy-based Optical Internet Security Management

Page 25: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 25

PolicyPolicy--based Network Management Trendbased Network Management Trend

? Advanced countries? Policy-based Network Management : HP, Extreme Networks,

Cisco, Orchestream, Intel? Policy-Framework : IETF Policy, DiffServ WG ? Application Networks : vBNS, CA*net II, TEN-155

PS

SLASLA

COPS

COPS

COPS

PS

PS PS

Page 26: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 26

PolicyPolicy--based Security Management Concept (1)based Security Management Concept (1)

침입방어메커니즘

사이버순찰메커니즘(이동형)

사이버순찰메커니즘

상황전파

상황전파

보안정책전달

사이버순찰제어시스템

Page 27: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 27

24시간네트워크순찰

네트워크보안현황 map 작성방어 시나리오 작동

해커들의 거주지(우범 네트워크)

요주의관찰

상황전파

경로역추적패킷차단

우회로설정패킷폐기

방어막작동지시

신나는 사이버여행 Groggy!

신나는 사이버쇼핑

사이버순찰메카니즘

침입방어메카니즘

PolicyPolicy--based Security Management Concept (2)based Security Management Concept (2)

Page 28: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 28

Router접속점

ServiceServer

응용서버

쇼핑몰

루트정책

보안정책배포

침해보고

방어정책

순찰정책

호스트 보안 영역네트워크 보안 영역

보안 API보안 API

•Individual Security Management

Integrated Security Management

방어정책

순찰정책보안정책배포

침해보고

PolicyPolicy--based Security Management Concept (3)based Security Management Concept (3)

Page 29: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 29

Active Security Management

Page 30: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 30

Active Network Concept (1)Active Network Concept (1)

? All packets are processed by an identical method

? Passive network management

Present NetworkPresent NetworkPresent Network

? Real time transformation according to user requirement

? Flexible active network

Active NetworkActive NetworkActive Network

Page 31: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 31

Active Network Concept (2)Active Network Concept (2)

? Hard to respond actively to traffic variations? Hard to accept new service quickly

Present NetworkPresent NetworkPresent Network

Active NetworkActive NetworkActive Network? Real time modification of network function can be possible? Can respond actively to traffic variations that cannot been

foreseen

서버 용량 초과

전송 용량 초과

ProgrammableH/W를 이용하여서버기능 생성

Page 32: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 32

? Active Security Management?ASM = Active Network Technology + Active Security Technology

?Active sensor network engine

Performs active security management in real time without regard to network status and kinds of platform

?Active sensor programming languageIs the description language for programming security mechanism and active

security service

?Active security management system

Performs active security management and control using mobile sensor technology, active sensor network engine, and active security core technology

Active Security ManagementActive Security Management

Page 33: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 33

능동 보안관리 시스템 능동 보안관리 시스템

능동감지형네트워크엔진

? Active security management by using mobile sensor technology

Active Security Management ConceptActive Security Management Concept

Page 34: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 34

? Active Network? ITO of DARPA make a study of secure networking (1994)? Participants : MIT, Bellcore, BBN. UCLA, Columbia, TASC, UArizona

? FAIN (Future Active IP Networks ) project?European Union performs Information Society Technologies (IST)

program?Develop active node-based ‘reliable, secure, manageable

network architecture’?Participants : T-Nova Deutsche Telekom, France Telecom,

Hitachi Europe Ltd., University College London, Jozef Stefan Institute

? MIRAInet? Is next network solution (1999, NTT)? Adaptive network

? Domestic research trend? ETRI & some universities make a study of active network? There is no result about active network

Research TrendsResearch Trends

Page 35: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 35

Optical Security

Page 36: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 36

International IT trafficInternational IT traffic

Page 37: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 37

Evolution of Optical InternetEvolution of Optical Internet

100G

10M

Year

10T

1G

1980 1990 2000 2010

Limits of CurrentElectronic Switching

OC-48

OC-12OC-3

OC-192

Optics

Electronics

OC-1

Tra

nsm

issi

on

Cap

acit

y (b

/s)

“All-Optical”Network25 T

OC-784

Limits of Single Mode Fiber Bandwidth

CommercialCommercialTDM (single TDM (single channel)channel)SystemsSystems

BIT: WDM (multiple Channels),Soliton

Page 38: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 38

Comparisons Comparisons

Page 39: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 39

Optical Internet Optical Internet TestbedTestbed

Page 40: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 40

NGI NGI TestbedTestbed (x1000)(x1000)

X100 TestbedX100 X100 TestbedTestbed

X1000 TestbedX1000 X1000 TestbedTestbed

Page 41: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 41

Directions of Optical Internet DevelopmentDirections of Optical Internet Development

Page 42: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 42

Security Security Vulnerabilities of Optical InternetOptical Internet

Security vulnerabilities of Optical Internet

Transparency

Eavesdrop

ServiceDisruption

Servicedecline

? VVulnerabilities of Optical InternetOptical Internet ? Vulnerabilities of present InternetInternet

Page 43: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 43

Optical Security ConceptOptical Security Concept

? Security vulnerabilities of optical internet are serious? Tbps level encryption technology is needed for optical internet? Absolutely secure crypto-algorithm is needed

NeedsNeedsNeeds

? Tbps level optical encryption technology? Tbps level optical random generator? Key distribution technology based on quantum cryptography? Multi-dimensional encryption technology? End-to-End optical crypto-system

Major TechnologiesMajor TechnologiesMajor Technologies

Page 44: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 44

The other technologies

Page 45: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 45

? High secure crypto-algorithm? Crypto-protocols for all IP wired & wireless convergent network? Plug-in secure module? Gbps level security on chip? Secure OS? Secure routing engine? Secure gateway? VPN service router? Secure Node system? Next generation wireless security technology? Implementation of CC-based security system and standardization

The other technologiesThe other technologies

Page 46: Development of Network Security Technologycaislab.kaist.ac.kr/lecture/2001/autumn/ice615/down/ICU... · 2018-09-27 · ETRI Development of Network Security Technology 2001. 9. 25

ETRI Proprietary Information Security Division 46

? Individual security system -> multifunctional integrated security system? New security mechanism is needed for mutual connection between

security systems? Functional regulations between security systems are needed? Passive security system -> active security system? CC-based security system for improving international competition

? Policy-based optical network security management? Active security management? Optical security? CC-based secure network node

Core TechnologiesCore TechnologiesCore Technologies

Needs of Secure Networking TechnologyNeeds of Secure Networking TechnologyNeeds of Secure Networking Technology

ConclusionsConclusions