Inter-Collaboration Design between ISP CERTs and Security Center for Effective Response of Large-Scale Cyber Attacks

  • Authors

    • Kyuil Kim
    • Buseung Cho
    • Wonhyuk Lee
    • Dongkyun Kim
    • Hyungwoo Park
    2018-06-08
    https://doi.org/10.14419/ijet.v7i2.33.18006
  • Cyber-attacks, Inter-Collaboration, ISP CERTs, Security Monitoring & Response, Hacking
  • Recently, cyber-threats have been increased every day with most of the information is transmitted by internet. Many institutions perform appropriate countermeasure against cyber crisis. However, they have been considered a partial solution to the problem. The current response for large-scale cyber-attacks is inadequate. Many institutions that provide main service and resource to the user are suffered by cyber-attacks. We propose the effective response method against their cyber threats. Our proposed mechanisms reduce the cyber threats through inter-collaboration design between ISP CERTs and security monitoring and response. While they perform the security monitoring for the only own circuit, the institution use the various networks such as main network and backup network etc. Among their network, ISP CERTs can exist or can’t exist and security center can exist or can’t exist too by the security service policy of ISP. Therefore, while institution reduces the cyber threat through them, the circuit that they don’t exist significantly increases the security threat.  And the institution not only hasn’t the trust for the circuit but also increase in cyber threat because ISP optionally provides the security service. Therefore, we design the inter-collaboration mechanisms of them that rapidly and exactly response the cyber-attacks. We also implement inter-collaboration system based on the global threat management, global network control, RBL(Real-time Blocking List)

  • References

    1. [1] C.L. Philip Chen and Chun-Yang Zhang, “Data-Intensive applications, challenges, techniques and technologies: A survey on Big Data,†Information Sciences Journal of Elsevier, vol. 275, pp.314-347, Aug. 2014.

      [2] Gandhi R., Sharma A., and Mahoney W., et al., “Dimensions of Cyber-Attacks: Cultural, Social, Economic and Political,†IEEE Technology and Society Magazine, vol. 30(1), pp. 28-38, Mar. 2011.

      [3] M. Indu Masheswari, S. Revathy and R.Tamilarasi, “ Secure Data Transmission For Multi-sharing in Big Data Storage,†Indian Journal of Science and Technology, vol. 9(21), DOI: 10.17485/ijst/2016/v9i21/95164, Jun. 2016.

      [4] Narayanam Sri Prakash and N. Venkatram, “Establishing Efficient Security Scheme in Home IOT Devices through Biometric Finger Print Technique,†Indian Journal of Science and Technology, vol. 9(17), DOI: 10.17485/ijst/2016/v9i17/93039, May 2016.

      [5] Sangjun Ko, Kyuil Kim, Yousu Lee and Jungsuk Song, “A Classification Method of Darknet Traffic for Advanced Security Monitoring and Response,†Lecture Notes in Computer Science, vol. 8836, pp 357-364, 2014.

      [6] S. Rahimi Moosavi, T. Nguyen Gia, E. Nigussie, et al., “Session Resumption-Based End-to-End Security for Healthcare Internet-of-Things,†Proceeding of IEEE International Conference (CIT/IUCC/DASC/PICOM), DOI: 10.1109/CIT/IUCC/DASC/PICOM.2015.83, pp. 581-588, Oct. 2015.

      [7] Teng Xu, James B. Wendt and Miodrag Potkonjak, “Security of IoT system: Design challenges and opportunities,†Proceedings of IEEE/ACM International Conference (ICCAD), DOI: 10.1109/ICCAD.2014.7001385, pp. 417-423, Nov. 2014.

  • Downloads

  • How to Cite

    Kim, K., Cho, B., Lee, W., Kim, D., & Park, H. (2018). Inter-Collaboration Design between ISP CERTs and Security Center for Effective Response of Large-Scale Cyber Attacks. International Journal of Engineering & Technology, 7(2.33), 1156-1159. https://doi.org/10.14419/ijet.v7i2.33.18006