This application is based upon and claims the benefit of priority of the prior Japanese Patent Application No. 2014-109914 filed on May 28, 2014, the entire contents of which are incorporated herein by reference.
The embodiments discussed herein are related to an authentication information theft detection method, an authentication information theft detection device, and a computer-readable recording medium storing program for the same.
In the related art, a communication device, such as a server, that is connected to a network that is administered by a network administrator (NW administrator) has been lent to a user, hereinafter referred to as a network user or NW user. The NW user provides a certain service, such as Web service, email service, cloud service, or the like, for an end user, using the lent communication device.
Typically, as the communication device, there is “rental server” that is a server on a network that is managed by a network service provider (NSP) as a NW administrator, which is lent to NW users that correspond to various organizations such as a company and a school, or individuals. The NW user manages a Web site (Web service), an email service, and the like, using the lent server. The end user may be a member of each of the organizations, or an individual who does not have such restriction.
When each of the end users utilizes the service, each of the users logs into a system of the NW user, using authentication information that has been registered in advance (typically, an end user name and a password). The log-in record (access log) of the end user is recorded, for example, to the server that provides the service. The access log is administered by each of the NW users, so that the NW administrator is not allowed to access the access log.
Recently, an incident occurs that the authentication information of the end user is stolen though a cyber attack, and the attacker masquerades as the end user to gain unauthorized entry into the system. Therefore, there is a demand from the NW user to find out whether or not the authentication information (especially, end user name) has been stolen, in point of view of end user protection.
Japanese Laid-open Patent Publication Nos. 2008-227931, 2004-220373, 2010-239392, 2005-234729, 2005-332152, and 2012-212354 are examples of the related art.
According to an aspect of the invention, an authentication information theft detection method performed by an information processing device which detects theft of authentication information that is used for log-in by a user, for a communication device that provides a certain service for the user when the log-in is performed successfully, the authentication information theft detection method includes, causing the information processing device to store, for each log-in request, a record that includes information on a log-in request source, authentication information that the log-in request source submits to the communication device when the log-in is performed, and information that indicates a success or failure of the log-in using the authentication information; causing the information processing device to receive information on an attack source against the communication device, from a management device of a network in which the communication device exists; causing the information processing device to determine that authentication information in the record is stolen by the attack source when information that indicates success of the log-in is stored in the record, the record including information on the log-in request source which is matched with the information on the attack source; and causing the information processing device to output the authentication information that is determined to be stolen.
The object and advantages of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the claims.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the invention, as claimed.
As described in the background, it has been difficult for the NW user to determine theft of the authentication information from the content of the access log to the service. The reason is as follows. In a typical access log, an IP address (transmission source IP address) of a log-in request source (end user), an end user name and a password that have been used for the log-in, and success or failure of the log-in are recorded as a single record.
When an end user name and a password are stolen, an information element in the record, which is used to determine whether or not the log-in is unauthorized, is an IP address. However, an IP address of the end user is generally lent by a Dynamic Host Configuration Protocol (DHCP) server, so that the IP address is not fixed. In addition, the IP address of the log-in request source varies in the case where the end user uses a plurality of terminals, changes the location at which the end user tries the log-in, or the like. Thus, even if a certain record in the access log is a record of unauthorized log-in using the stolen end user name and password, it has been difficult for the NW user to determine whether or not the log-in is unauthorized log-in, from an IP address of the corresponding record.
Accordingly, there is desired a technology by which theft of authentication information may be detected using an access log by taking a clue from information on a log-in request source
Embodiments are described below with reference to drawings. Configurations of the embodiments are examples, and the disclosure discussed herein is not limited to such configurations.
<System Configuration Example>
In
To the network 1, a plurality of communication devices are connected. In
Each of the servers 2A, 2B, and 2C is lent to a network user (NW user) from the NW administrator. For example, the server 2A is lent to a NW user A that is a company, the server 2B is lent to a NW user B that is a university, and the server 2C is lent to a NW user C that is a certain organization. However, the NW user may be any one of a company, a school, an organization other than a company and a school, and an individual.
Each of the NW users A, B, and C provides a network service for the end user, using the lent server 2. The servers 2A, 2B, and 2C respectively operate as service provision systems of the NW users A, B, and C. For example, the servers 2A, 2B, and 2C respectively operate as Web service provision systems that provide Web sites that are managed by the NW users A, B, and C. The end user is an example of “user”.
The service provision system related to the Web site that is managed by the server 2A, hereinafter referred to as “system A”, is utilized by a plurality of end users that are members of the company, where the number of the plurality of end users is “n”, a positive integer. Each of the end users of the system A accesses the server 2A (system A), using a terminal 3 that is used by the end user, and may receive various pieces of information such as a text, an image, sound, and a video, provided through browsing of the Web site.
The service provision system related to the Web site that is managed by the server 2B, hereinafter referred to as “system B”, is utilized by a plurality of end users that are students and staffs of the university, where the number of the end users is “n”, a positive integer, for example. Each of the end users of the system B accesses the server 2B (system B), using the terminal 3 that is used by the end user, and may browse the Web site.
The service provision system related to the Web site that is managed by the server 2C, hereinafter referred to as “system C”, is utilized by a plurality of end users that are members of the organization, where the number of the end users is “n”, a positive integer, for example. Each of the end users of the system C accesses the server 2C (system C), using the terminal 3 that is used by the end user, and may browse the Web site.
The network service that is provided by the NW user includes various services such as an email and a cloud in addition to a Web site, and the content of a service to be provided is not limited. However, each of the end users logs into the system, using authentication information that has been registered in advance (end user name and password in the embodiment), in usage of the service.
Each of the servers 2A, 2B, and 2C that operate as the service provision systems stores, as an access log, a record that the end user has tried to log into the system using the terminal 3. That is, the server 2A stores an access log to the system A, and the server 2B stores an access log to the system B, and the server 2C stores an access log to the system C. Each of the access logs stores one or more records each of which includes at least an IP address of an access person (log-in request source), authentication information (end user name and password), and information that indicates success or failure of the log-in. The end user name is an example of “user identifier” or “user ID”.
The network 1 is connected to an external network (external NW) 4. The external network 4 is, for example, an IP network that is represented by the Internet (public network) and an intranet. The terminal 3 that is connected to the network 1 may communicate with a terminal that is connected to the external network 4, by transmission and reception of a packet.
There is a possibility that each of the servers 2A, 2B, and 2C receives a cyber attack (indicated by a broken line in
The management device 6 includes a security device that is called an intrusion detection system (IDS) device 7 to monitor a cyber attack, see
When the plurality of packets indicates the pattern of the specific event, the IDS device 7 performs the recording to a log (IDS log). The IDS device 7 determines whether or not the packets indicate the pattern of the specific event such as server attack, based on whether or not the packets are matched with the pattern of the specific event, which has been registered in advance, or based on comparison with a pattern in the past.
The management device 6 further includes an IDS log analysis device 8, hereinafter referred to as the analysis device 8, that analyzes a log that has been output from the IDS device 7, see
Each of the servers 2 (the servers 2A, 2B, and 2C, and the server 2A is illustrated in
That is, the verification device 9 determines whether or not the IP address of the log-in request source is the attack source IP, that is, whether or not the log-in request source information is matched with the attack source information, and whether or not a record that includes information on success of the log-in is stored in the access log. When the corresponding record is found from the access log (YES in <2> in
The verification device 9 performs output of the stolen user name (<4> in
<Configuration Example of Information Processing Device>
The memory 12 includes a non-volatile storage medium and a volatile storage medium. The non-volatile storage medium is, for example, is a read only memory (ROM), and the volatile storage medium is, for example, a random access memory (RAM). The memory 12 is used as a work area of the CPU 11.
The auxiliary storage device 13 is, for example, at least one of a hard disk drive, a solid state drive (SSD), an electrically erasable programmable ROM (EEPROM), and a flash memory. The auxiliary storage device 13 stores a program that is executed by the CPU 11, and data that is used when the program is executed. Each of the memory 12 and the auxiliary storage device 13 is an example of “storage device” or “storage medium”.
The communication IF 14 is a device that performs protocol conversion and signal conversion related to the communication. As the communication IF 14, for example, a communication interface device such as a network interface card (NIC) or a network card is applied. The communication IF 14 is an example of “transmission device” and “reception device”.
The input/output device 15 includes an input device and an output device. The input device includes at least one of a key, a button, a pointing device such as a mouse, and a touch-screen, and is used for input of information. The output device is, for example, a display device, and is used for display of information. The input/output device 15 may include an audio input device such as a microphone, and an audio output device such as a speaker.
The CPU 11 executes a program that is stored in the auxiliary storage device 13 by loading the program into the memory 12. Therefore, the information processing device 10 may operate as the management device 6, and also operate as the server 2.
<Functional Configuration>
<<Management Device>>
The IDS device 7 includes an attack detection unit 71 and an IDS log database (IDS log DB) 72. The analysis device 8 includes an attacked destination group analysis unit 81, an attack source analysis unit 82, and an attack source information transmission unit 83.
The CPU 11 of the information processing device 10 that operates as the management device 6 operates as the attack detection unit 71, the attacked destination group analysis unit 81, the attack source analysis unit 82, and the attack source information transmission unit 83 by executing programs. The IDS log DB 72 is stored in the auxiliary storage device 13 or the memory 12 of the information processing device 10 that operates as the management device 6.
[IDS Device]
The IDS device 7 is a device that manages an intrusion detection system (IDS) that is used to monitor a cyber attack. The IDS device 7 detects, for example, a brute force attack from the attack source. Here, the brute force attack is an attack in which decoding of a cipher text is tried by listing up all conceivable keys. There also exists a dictionary attack in which search is performed using words that are collected in a dictionary as candidates, and an attack using a value that is initially set to the system, in order to perform efficient attack. The brute force attack includes an attack in which a large amount of identifiers (ID) and passwords that are considered to have been leaked from a certain system are used to log into another system.
The IDS device 7 is used for a counter-measure to detect a brute force attack and mainly monitor an access to a communication device having a certain IP address. The IDS device 7 includes a function to identify an IP address of an attack source. The management device 6 may perform protection such as blocking of the communication from the attack source IP that has been identified by the IDS device 7.
The attack detection unit 71 of the IDS device 7 detects a packet that is related to the brute force attack, from among packets that flow from the external network 4 to the network 1, and issues an event to inform an abnormality, to the analysis device 8. The attack detection unit 71 stores information on the detected packet that is related to the brute force attack, in the IDS log DB 72.
“Hacker” indicates “attack source”. The attack source indicates a communication device that is the source of communication, which tries an attack (brute force attack in the embodiment) against the system that is provided using the server 2. In the embodiment, the attack source is identified by an IP address of the source.
“Victim” indicates “attacked destination”. The attacked destination indicates a communication device that receives the brute force attack. In the embodiment, the attacked destination is identified by an IP address that has been assigned to the attacked communication device (server 2).
Here, “detection time point” indicates a time point at which the IDS detects the brute force attack. “Number of attacks” indicates the number of log-in trials by the attack source. The number of attacks is also referred to as “number of log-in trials”. The number of attacks may be the number of detections of the brute force attack in which log-in to the attacked destination has been tried from the attack source, in a certain continuous time period that includes a certain detection time point. This is because, in the brute force attack, log-in is repeatedly tried using end user names and passwords by guesswork in order to steel an unknown end user name and password.
For example, when a certain attacked destination receives an attack from an attack source over five minutes from a certain time point, the total number of attacks in the five minutes may be considered as “number of attacks”. The number of attacks may be the number of detections of the brute force attack in a unit of a time. Alternatively, the number of attacks may be an average of the number of attacks in a unit of a time (for example, one minute), in a certain time period (for example, five minutes).
“Port” is a port number of the communication device (server 2) that is the attacked destination in which the attack is detected. The attack detection unit 71 refers to a transmission source IP address and a destination IP address of packets that flows from the external network 4 to the network 1, and writes a record to the IDS log DB 72, for example, when a transmission pattern of packets from a certain transmission source to a certain destination is matched with a pattern of the brute force attack.
As understood from the content of records illustrated in
[Analysis Device]
Returning to
For example, the attacked destination group analysis unit 81 may start analysis by obtaining an IDS log periodically. Alternatively, the attacked destination group analysis unit 81 may start analysis using reception of an event that has been issued from the IDS device 7, as a trigger.
For example, the attacked destination group analysis unit 81 calculates a correlation coefficient of the number of attacks and the detection time point for a plurality of attacked destinations (Victims), based on the data (IDS log) that is stored in the IDS log DB 72.
As a calculation method of a correlation coefficient related to the number of attacks and the detection time point, for example, a maximum clique method may be used. In addition, communication devices (Victims) having high correlation coefficients are selected, and identified as an attacked destination group (Victim group or communication device group). In the storage area (storage area of the auxiliary storage device 13 or the memory 12) to which the attacked destination group analysis unit 81 refers, an analysis setting DB (not illustrated) is stored. In the analysis setting DB, at least a threshold of the correlation coefficient that is used to identify an attacked destination group, and a time period (analysis interval) of IDS log data that has been used for the analysis are included. The attacked destination group analysis unit 81 obtains data that is matched with the analysis interval, from the IDS log, and selects (identifies) an attacked destination for which the calculation result of the correlation coefficient exceeds the threshold.
For example, a correlation coefficient R may be defined, as the following expression, where “xi,” represents the number of brute force attacks that are received at a communication device vi, and “ti” represents the detection time point at which the brute force attacks have been detected.
Here, “xav” represents an average of the number of brute force attacks xiand, “tav” is an average of the detection time points tiat which the brute force attacks xihas been detected. The number of brute force attacks may be the number of attacks per minute.
As described above, when the brute force attack is tried to an attacked destination group, a history is left in the IDS log, in which an attack has been performed from a certain single attack source to a plurality of attacked destinations by approximately the same number of times, at approximately the same time point.
The attacked destination group analysis unit 81 calculates a correlation coefficient of an access time point (detection time point) and the number of log-in trials (number of attacks) from a certain transmission source IP address, for a plurality of communication devices. When the correlation coefficient of the detection time point and the number of attacks is a threshold or higher, the attacked destination group analysis unit 81 identifies the certain transmission source IP address as an attack source IP, and identifies the plurality of communication devices as an attacked destination group.
In the example illustrated in
In the example illustrated in
When it is assumed that the IP addresses V1, V2, and V3 are respectively the IP addresses of the servers 2A, 2B, and 2C, the attacked destination group analysis unit 81 may identify the attack source IP for the servers 2A, 2B, and 2C that are in the attacked destination group.
The attack source analysis unit (analysis unit) 82 of the analysis device 8 obtains information on an IDS log, from the IDS log DB 72, and obtains information on the attacked destination group, from the attacked destination group analysis unit 81. The attack source analysis unit 82 identifies a record that includes an IP address (Victim) of each of the attacked destinations, from the IDS log, and identifies an IP address of an attack destination (Hacker) in the identified record, as the attack source IP.
The attack source information transmission unit 83 as a transmission unit executes processing of transmitting attack source information that includes the attack source IP, to the IP addresses of the attacked destination group. That is, the attack source information transmission unit 83 generates a packet that includes the attack source information. At that time, the IP address of the attacked destination is set as the packet destination IP address of the packet.
The communication IF 14 of the information processing device 10 that operates as the management device 6 transmits the packet to the attacked destination (server 2). Therefore, the attack source information (attack source IP) is received at each of the servers 2A, 2B, and 2C that are included in the attacked destination group.
The transmission of the attack source information may be started using acquisition of the attack source information as a trigger. Alternatively, the attack source information is stored in a certain storage area of the auxiliary storage device 13 or the memory 12, and the attack source information transmission unit 83 may execute transmission processing of the attack source information in response to a request from the verification device 9.
<<Server>>
As illustrated in
The CPU 11 of the information processing device 10 that operates as the server 2 operates as a provision system of a Web service by executing a program that is stored in the auxiliary storage device 13. That is, the server 2 operates as a Web server that provides information on a Web page for the terminal 3 of an end user that is a Web client. A program and data that are used to operate the server 2 as the Web server are stored in the auxiliary storage device 13 in advance.
The CPU 11 receives a log-in request to the Web site, which has been transmitted from the terminal 3 of the end user to the server 2, through the communication IF 14. After that, the CPU 11 reads information on a Web page of a log-in screen, from the auxiliary storage device 13, and transmits the information to the terminal 3. The information on the Web page is stored in the auxiliary storage device 13 in advance.
The end user who uses the terminal 3 inputs authentication information, that is, an end user name and a password, using the log-in screen, where the authentication information is also referred to as an authentication code. The authentication information is received at the communication IF 14 of the server 2 from the terminal 3, and transmitted to the CPU 11.
The CPU 11 determines whether or not the authentication information is authorized, using authentication information that is stored in the auxiliary storage device 13 in advance. When the authentication information is authorized, the CPU 11 determines “OK (Yes)” of the log-in, and executes processing of transmitting information on the next Web page, to the terminal 3. On the other hand, when the authentication information is unauthorized, the CPU 11 determines “NG (No)” of the log-in, and executes processing of transmitting an error message, to the terminal 3.
As the case in which the authentication information is unauthorized, for example, there are a case in which the end user name is not registered as authentication information, and a case in which the password is not matched with a password that has been registered as authentication information.
The CPU 11 stores a record that includes success or failure of the authentication (that is, success or failure of the log-in), in the access log DB 92. At that time, as an information element (parameter) that is included in the record, at least, an IP address of a communication device that is a transmission source of a log-in request, authentication information (end user name and password), and information that indicates success or failure of the log-in are included.
The CPU 11 performs record registration to the access log DB 92 each time when the authentication processing based on a log-in request is executed. In such records (logs) of the access log DB 92, there may be included a log of a result of a log-in request from the terminal 3 of the authenticated end user, and a log of a result of a log-in request from the terminal 5 that is an attack source by a brute force attack.
In
After that, the access log verification unit 91 extracts records each of which includes an attack source IP, from the log data (Step 03). After that, the access log verification unit 91 determines whether or not a record that includes information that indicates success of the log-in exists in the extracted records (Step 04).
At that time, when the corresponding record does not exist in the extracted records (No in “Step 04”), the processing illustrated in
The processing of “Step 01” and the processing of “Step 02” in
The access log verification unit 91 refers to information (status) on “success/failure of the log-in” in each of the records 2 and 3. At that time, each of statuses of the records 2 and 3 indicates “Yes (success of the log-in)”. Therefore, the access log verification unit 91 determines that both the pieces of authentication information in the records 2 and 3 have been stolen by an attack source. The authentication information of the record 2 corresponds to an end user name “Alice” and a password “1234”, and the authentication information of the record 3 corresponds to an end user name “Bob” and a password “aaaa”. The access log verification unit 91 registers the end users names (“Alice” and “Bob”) of the record 2 and the record 3 to the stolen user name list 93.
The interface unit 94 displays information on the attacked destination that has been identified by the access log verification unit 91.
As described above, the attack source information (attack source IP) is transmitted to the verification device 9 in each of the servers 2A, 2B, and 2C that are identified as the attacked destination group. Thus, the verification device 9 in each of the servers 2 executes the above-described processing. As a result, in addition to the NW user A, each of the NW user B who utilizes the server 2B and the NW user C who utilizes the server 2C also may know the end user names that have been stolen, by the attack source by referring to the corresponding stolen user name list 93.
For example, the NW user A performs setting change of the system A so that the log-in using the end user names “Alice” or “Bob” is rejected regardless of any password. Such setting change may be performed manually. Alternatively, such setting change may be executed automatically using a certain algorithm (program), for example, when an end user name is added to the stolen user name list 93. Therefore, unauthorized log-in (masquerade) by the attack source may be avoided.
In addition, the NW user A requests the end user having each of “Alice” and “Bob” to change the end user name. Due to the change of the end user name, the masquerade by the attack source is not allowed to be performed. In addition, when rejection of log-in using the stolen end user name is set, an environment may be obtained in which the authenticated end user is allowed to log into the system A, due to the change of the end user name. The change request is sent to the end user through an appropriate method such as an email or by post.
<Operation Effect of Embodiments>
In the embodiment, the verification device 9 detects that authentication information (end user name) has been stolen, using an access log and an attack source IP, and registers the detected stolen authentication information to the stolen user name list 93. The NW user may take measures against the theft by referring to the output stolen user name list 93.
When the server 2 (verification device 9) receives the attack source information (attack source IP) that has been obtained by the management device 6 (IDS device 7 and analysis device 8) that is managed by the NW administrator, the server 2 may detect the theft, using an existing access log. Therefore, introduction cost that is desired when the NW user knows theft of authentication information from the access log is reduced.
In addition, in the attack source IP identification method according to the embodiment, an attack source IP may be identified using an IDS log that has been obtained in a relatively short time period. Therefore, there is no disadvantage that an access log in a long time period is desired in order to obtain sufficient data that is used to determine whether or not an IP address in the access log is not authorized, as compared with an existing reputation service.
In addition, in the attack source IP identification method according to the embodiment, in the management device 6, an IP address that performs an attack (log-in trial) by approximately the same number of times against each of an attacked destination group that includes the communication devices (servers 2), at a certain time point, is identified an attack source IP that is to be supplied to the verification device 9. Therefore, even in the attack (log-in trial) that has been performed by the relatively-small number of times, the attack source IP may be identified.
A method or a configuration according to the embodiment may perform to identify easily an IP address of the attack in terms of no need of detection of a large amount of log-in trial failures, as compared with a method or a configuration that determine unauthorized log-in success based on a feature in an access log that there is a record in which log-in is performed successfully once after a large amount of log-in trial failures.
In addition, for example, there is a method in which an IP address and an end user name are associated with each other, and success of log-in with an IP address that is different from the associated IP address usually used is determined as unauthorized log-in. In such a method, it is probable that unauthorized log-in is falsely detected when an end user uses a plurality of terminal 3. In addition, the false detection may occur even when a single end user name is shared between a plurality of people.
In the attack source IP identification method according to the embodiment, a plurality of IP addresses is detected as attack source IPs as long as a condition is satisfied in which an IP address is identified as the attack source IP. Therefore, the above-described disadvantage (false detection) due to the method by the association is not caused. In addition, in the attack source IP identification method according to the embodiment, for brute force attacks using a plurality of IP addresses, each of the attack sources IP may be detected.
<Modifications>
In the embodiment, an attack source IP is identified by the method that is described above with reference to
In addition, in the embodiment, as attack source information, an IP address is used. Therefore, management that is independent of a communication device that is an attack source may be performed, and the association with an existing access log to which an IP address of a log-in request source (transmission source) is recorded may be performed easily. However, that the attack source information is an IP address is not the indispensable condition, and information other than an IP address may be applied as the attack source information as long as log-in request source information that is matched with the attack source information in the access log is identified. The information on the log-in request source that is recorded to the access log is also not limited to a transmission source IP address.
In addition, in the embodiment, the example is described in which the IDS device 7 and the analysis device 8 operate on the single information processing device 10 (management device 6). However, the IDS device 7 and the analysis device 8 operate on respective information processing devices, and an IDS log that is obtained in the IDS device 7 through the communication between the information processing devices may be transmitted to the analysis device 8.
In addition, in the embodiment, the example is described in which the verification device 9 that is an example of “information processing device” is included in the server 2 that is an example of “communication device”. Instead of such a configuration, the verification device 9 may be installed in an information processing device that may communicate with the server 2 and is independent of the server 2. In this case, it is only sufficient to add a configuration in which an access log is supplied to the verification device 9, to the existing server (service provision system), and a modification degree of the server may be caused to be small. In addition, an information processing device that operates as a Web server may be different from an information processing device that stores an access log DB.
All examples and conditional language recited herein are intended for pedagogical purposes to aid the reader in understanding the invention and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a showing of the superiority and inferiority of the invention. Although the embodiments of the present invention have been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
2014-109914 | May 2014 | JP | national |