This application claims the benefit of Korean Patent Application No. 10-2021-0114854, filed Aug. 30, 2021, which is hereby incorporated by reference in its entirety into this application.
The present invention relates generally to technology for determining a device group to be isolated using similarity of features between devices, and more particularly to Internet-of-Things (IoT) security technology for preventing security threats occurring in an IoT environment from spreading.
With the continued growth of IoT markets, the number of network-connected IoT devices is increasing exponentially, but it is not easy to include a security function in IoT devices, which are characterized by ultra-low weight, low power, and low performance. A security threat in IoT infrastructure arises from a large number of devices in which no security function is installed or devices that are not appropriately managed by neglecting firmware updates for strengthening weak points. Cases of cyberattacks such as a Mirai botnet, which causes large-scale DDoS attacks using a botnet generated by infecting IoT devices vulnerable to security issues, show that, when a large number of IoT devices are exploited for cyberattacks, the damage can be very severe.
In order to improve the security of IoT infrastructure, various security solutions are applied to respective components of IoT infrastructure pertaining to, for example, devices, networks, services/systems, data/privacy, and the like. Also, a security level and insights into security are improved, but attack methods are also sophisticated, so it is not easy to completely prevent security threats.
A device infected with malicious code configured to convert an IoT device to act as a bot looks for an accessible device having a security vulnerability in the vicinity thereof and spreads the malicious code thereto. A device having features similar to those of the device infected with malicious code is highly likely to be infected with the same malicious code.
A security control device presented in the related art determines an IoT device group to be isolated based on the magnitude of a security threat in a device group in order to prevent a security threat that has broken into IoT infrastructure from proliferating across the entirety of the IoT infrastructure. Here, because the magnitude of a security threat is calculated as a percentage of devices in which the security threat has occurred, among all devices included in a device group, if the same amount of security threat occurs in an additional device group having a large size, the additional device group is not isolated, so the security threat may continuously spread.
An object of the present invention is to determine a device group having feature information similar to that of devices in which a security threat is detected.
Another object of the present invention is to look for a device group having a high possibility of a security threat occurring therein, notify an administrator of the device group, and take security measures, such as eliminating a vulnerability causing the security threat, isolating the device group from IoT infrastructure, and the like.
In order to accomplish the above objects, a method for determining a device group to be isolated according to the present invention includes generating device groups in consideration of respective features of all devices; generating a security threat device group based on devices in which a security threat has occurred, among all of the devices; calculating cosine similarity between the security threat device group and each of all of the device groups; and determining at least one device group to be isolated, among all of the device groups, in consideration of the cosine similarity.
Here, each of all of the devices may have multiple features, and a single device is capable of being included in multiple device groups depending on features that distinguish the device groups.
Here, generating the device groups may comprise generating the device groups in a number equal to the number of possible combinations of the multiple features.
Here, calculating the cosine similarity may include preprocessing the respective features of all of the devices by extracting and vectorizing the respective features.
Here, preprocessing the features may comprise extracting word tokens corresponding to the features and calculating a relative frequency of occurrence of a word corresponding to each of the word tokens, thereby generating a feature vector.
Here, calculating the cosine similarity may comprise calculating the feature vector for each of the security threat device group and all of the device groups and calculating cosine similarity of the feature vectors between the security threat device group and each of all of the device groups.
Here, the cosine similarity may be represented as a value equal to or greater than ‘0’ and equal to or less than ‘1’, and as the value is greater, a corresponding device group may be determined to be more similar to the security threat device group.
Here, determining the at least one device group to be isolated may comprise determining the device group to be isolated using at least one of a method of selecting any one device group having the highest cosine similarity, among all of the device groups, as the device group to be isolated, a method of selecting a device group having cosine similarity equal to or greater than a preset reference similarity, among all of the device groups, as the device group to be isolated, and a method of selecting the N top device groups, among all of the device groups listed in descending order of cosine similarity, as the device group to be isolated.
Also, an apparatus for determining a device group to be isolated according to an embodiment of the present invention includes a processor for generating device groups in consideration of respective features of all devices, generating a security threat device group based on devices in which a security threat has occurred, among all of the devices, calculating cosine similarity between the security threat device group and each of all of the device groups, and determining at least one device group to be isolated, among all of the device groups, in consideration of the cosine similarity; and memory for storing information about all of the device groups and the security threat device group.
Here, each of all of the devices may have multiple features, and a single device is capable of being included in multiple device groups depending on features that distinguish the device groups.
Here, the processor may generate the device groups in a number equal to the number of possible combinations of the multiple features.
Here, the processor may preprocess the respective features of all of the devices by extracting and vectorizing the respective features.
Here, the processor may extract word tokens corresponding to the features and calculate a relative frequency of occurrence of a word corresponding to each of the word tokens, thereby generating a feature vector.
Here, the processor may calculate the feature vector for each of the security threat device group and all of the device groups and calculate cosine similarity of the feature vectors between the security threat device group and each of all of the device groups.
Here, the cosine similarity may be represented as a value equal to or greater than ‘0’ and equal to or less than ‘1’, and as the value is greater, a corresponding device group may be determined to be more similar to the security threat device group.
Here, the processor may determine the device group to be isolated using at least one of a method of selecting any one device group having the highest cosine similarity, among all of the device groups, as the device group to be isolated, a method of selecting a device group having cosine similarity equal to or greater than a preset reference similarity, among all of the device groups, as the device group to be isolated, and a method of selecting the N top device groups, among all of the device groups listed in descending order of cosine similarity, as the device group to be isolated.
The above and other objects, features, and advantages of the present invention will be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings, in which:
The present invention will be described in detail below with reference to the accompanying drawings. Repeated descriptions and descriptions of known functions and configurations which have been deemed to unnecessarily obscure the gist of the present invention will be omitted below. The embodiments of the present invention are intended to fully describe the present invention to a person having ordinary knowledge in the art to which the present invention pertains. Accordingly, the shapes, sizes, etc. of components in the drawings may be exaggerated in order to make the description clearer.
Hereinafter, a preferred embodiment of the present invention will be described in detail with reference to the accompanying drawings.
Referring to
Here, a device group may be a collection of devices having the same features.
Here, each of the devices has multiple features, and a single device is capable of being included in multiple device groups depending on the features that distinguish the device groups.
Here, a number of device groups equal to the number of possible combinations of multiple features may be generated.
For example, assume that a total of twelve devices having features F1, F2, and F3 constitute all devices 200, as shown in
If each device group is configured based on a combination of two features, a device group may be generated by collecting devices having the same values for each of two features, among F1, F2, and F3. That is, device groups may be generated based on a combination of possible values of F1 and F2, a combination of possible values of F1 and F3, and a combination of possible values of F2 and F3, and among all of the device groups 210 illustrated in
If each device group is configured based on a combination of three features, a device group may be generated by collecting devices having the same values for each of features F1, F2, and F3. Among all of the device groups 210 illustrated in
Here, the features of all of the devices may be preprocessed by extracting and vectorizing the same.
Here, word tokens corresponding to the features are extracted, and the relative frequency of occurrence of a word corresponding to each of the word tokens is calculated, whereby a feature vector may be generated.
Because features of a device are typically text information, it is necessary to convert the same into a numerical format before processing. Therefore, using a Term Frequency-Inverse Document Frequency (TF-IDF) algorithm, which is commonly used to calculate similarity between documents or to extract important words from a document, a word token is extracted from a feature and the relative frequency of occurrence of the word is calculated, whereby a feature vector may be generated.
Here, other text vectorization algorithms, such as an algorithm based on the frequency of occurrence of a word token and the like, may be used instead of the TF-IDF algorithm.
For example, as shown in
Also, in the method for determining a device group to be isolated according to an embodiment of the present invention, a security threat device group is generated at step S120 based on devices in which a security threat has occurred, among all of the devices.
Here, devices in which a specific security threat has occurred in a fixed time period are collected into a separate device group, whereby a security threat device group may be generated.
For example, assuming that a security threat has occurred in D1, D3, and D5, among all of the devices 200 illustrated in
Also, in the method for determining a device group to be isolated according to an embodiment of the present invention, the cosine similarity between the security threat device group and all of the device groups is calculated at step S130.
Here, a feature vector is calculated for each of the security threat device group and all of the device groups, and the cosine similarity of the feature vectors between the security threat device group and each of all of the device groups may be calculated.
Here, the cosine similarity is represented as a value equal to or greater than ‘0’ and equal to or less than ‘1’, and the greater the value, the more similar the device groups between which the cosine similarity is calculated.
That is, the similarity between the feature of the security threat device group and that of each of the device groups may be represented as a value ranging from 0 to 1.
Here, if the value of the cosine similarity is ‘1’, two vectors are the same as each other, and thus the two device groups may be determined to be the same as each other.
For example, the cosine similarity between the security threat device group S_V and each of all of the device groups may be calculated, as shown in
Also, in the method for determining a device group to be isolated according to an embodiment of the present invention, at least one device group to be isolated is selected from among all of the device groups in consideration of the cosine similarity at step S140.
Here, the device group to be isolated may be determined using at least one of a method of selecting any one device group having the highest cosine similarity, among all of the device groups, as the device group to be isolated, a method of selecting a device group having cosine similarity equal to or greater than a preset reference similarity, among all of the device groups, as the device group to be isolated, and a method of selecting the N top device groups, among all of the device groups listed in descending order of cosine similarity, as the device group to be isolated.
For example, as shown in
Through the above-described method for determining a device group to be isolated, a device group having feature information similar to that of devices in which a security threat is detected may be determined.
Also, a device group having a high possibility of a security threat occurring therein is found and made known to an administrator, whereby security measures, such as eliminating the vulnerability causing the security threat, isolating the device group from IoT infrastructure, and the like, may be taken.
Referring to
Accordingly, an embodiment of the present invention may be implemented as a non-transitory computer-readable storage medium in which methods implemented using a computer or instructions executable in a computer are recorded. When the computer-readable instructions are executed by a processor, the computer-readable instructions may perform a method according to at least one aspect of the present invention.
The processor 810 generates device groups in consideration of the features of all devices.
Here, each of the devices has multiple features, and a single device is capable of being included in multiple device groups depending on the features that distinguish the device groups.
Here, a number of device groups equal to the number of possible combinations of multiple features may be generated.
Here, the features of all of the devices may be preprocessed by extracting and vectorizing the same.
Here, word tokens corresponding to the features are extracted, and the relative frequency of occurrence of a word corresponding to each of the word tokens is calculated, whereby a feature vector may be generated.
Also, the processor 810 generates a security threat device group based on devices in which a security threat has occurred, among all of the devices.
Also, the processor 810 calculates the cosine similarity between the security threat device group and each of all of the device groups.
Here, a feature vector is calculated for each of the security threat device group and all of the device groups, and the cosine similarity of the feature vectors between the security threat device group and each of all of the device groups may be calculated.
Here, the cosine similarity is represented as a value equal to or greater than ‘0’ and equal to or less than ‘1’, and the greater the value, the more similar the two device groups between which the cosine similarity is calculated.
Also, the processor 810 selects at least one device group to be isolated, among all of the device groups, in consideration of the cosine similarity.
Here, the device group to be isolated may be determined using at least one of a method of selecting any one device group having the highest cosine similarity, among all of the device groups, as the device group to be isolated, a method of selecting a device group having cosine similarity equal to or greater than a preset reference similarity, among all of the device groups, as the device group to be isolated, and a method of selecting the N top device groups, among all of the device groups listed in descending order of cosine similarity, as the device group to be isolated.
The memory 830 and the storage 860 store information about all of the device groups and the security threat device group.
The device-feature-information-processing unit 920 may include a device group configuration module for configuring a device group based on feature information in the device information 910 and a device-feature-information-preprocessing module for preprocessing feature information of a device by extracting and vectorizing the same.
The device feature information analysis unit 930 may include a cosine similarity calculation module for calculating cosine similarity between devices in which a security threat has occurred and existing device groups and an isolation device group determination module for determining a device group to be isolated based on a similarity score.
According to the present invention, a device group having feature information similar to that of devices in which a security threat is detected may be determined.
Also, according to the present invention, an administrator is notified of a device group having a high possibility of a security threat occurring therein, whereby security measures, such as eliminating the vulnerability causing the security threat, isolating the device group from IoT infrastructure, and the like, may be taken.
As described above, the apparatus for determining a device group to be isolated using similarity of features between devices and the method using the apparatus according to the present invention are not limitedly applied to the configurations and operations of the above-described embodiments, but all or some of the embodiments may be selectively combined and configured, so the embodiments may be modified in various ways.
Number | Date | Country | Kind |
---|---|---|---|
10-2021-0114854 | Aug 2021 | KR | national |