The present invention relates to an information processing system, an information processing method, and an information processing program.
Conventionally, there is a technique of detecting unauthorized communication. For example, there are known techniques of installing a firewall or an Intrusion Prevention System (IPS) in a gateway or monitoring communication to specify a terminal that performs suspicious communication or behavior.
The known technique has a security problem. For example, there is a case where detection and blocking cannot handle the problem such as a case addressed to a personal computer (PC) immediately after infection.
The present invention has been made in view of the above, and aims to provide an information processing system, an information processing method, and an information processing program for achieving robust security.
According to an aspect of the embodiments, an information processing system includes an upper network device being a device constituting an overlay network and a lower network device being a device constituting an underlay network, wherein the upper network device includes first processing circuitry configured to block unauthorized communication notification of which is provided from the lower network device based on information regarding unauthorized communication, and the lower network device includes second processing circuitry configured to acquire information related to communication of a terminal connected to the lower network device detect unauthorized communication based on information related to communication of a terminal connected to the lower network device and notify the upper network device of the information regarding the unauthorized communication.
Hereinafter, embodiments of an information processing system, an information processing method, and an information processing program according to the present application will be described in detail with reference to the drawings. Note that the present invention is not limited by the embodiment. In the description of the drawings, the same portions are denoted by the same reference numerals, and redundant description is omitted.
First, a known technique will be described with reference to
In the following, a device constituting an overlay network will be denoted as an upper network (NW) device, while a device constituting an underlay network will be denoted as a lower NW device. Here, the upper NW device refers to, for example, a cloud proxy server or Unified Threat Management (UTM) equipment. The lower NW device refers to, for example, a network device such as Deep Packet Inspection (DPI) equipment, a router, and a switch.
In the conventional security countermeasures, networks are divided into a reliable “inside” and an unreliable “outside”, and countermeasures are taken at the boundary. An example of the inside network is a data center connected by an in-house local area network (LAN) or a virtual private network (VPN), and an example of the outside network is the Internet. For example, as a countermeasure taken at the boundary, security equipment such as a firewall, a proxy, or an Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) is installed at the boundary to monitor and control the communication, thereby blocking a cyberattack from the outside.
Such prior security measures assume that data and systems to be protected are inside the network. However, with the spread of the cloud, it is not unusual that there is a target to be protected on the Internet on the outside. In this manner, the targets to be protected are scattered in various locations to blur the boundary, making it difficult to take sufficient measures with a conventional mindset.
In view of this circumstance, the concept of zero trust is spreading. In the zero trust security service, various security countermeasures are taken on the assumption that all communications are not to be trusted. Specific examples of this include enhancement of user authentication by encryption of a communication path regardless of the inside and outside of the network, use of multi-factor authentication, and the like, and integrated log monitoring of the network and various devices connected to the network. A large number of security solutions for implementing the zero trust have already emerged. For example, there has been provided a measure such as Endpoint Detection and Response (EDR) that enables quick detection and handling of a cyberattack by monitoring a client device and analyzing a log.
Conventionally, there is a technique of detecting unauthorized communication (for example, malicious communication). For example, there are known techniques of installing a firewall or IPS in a gateway or monitoring communication to specify a terminal that performs suspicious communication or behavior.
The known technique has a security problem. For example, as illustrated in
An information processing system 1 of the present embodiment described below is an information processing system including: an upper NW device 100 being a device constituting an overlay network; and a lower NW device 200 being a device constituting an underlay network. In this system, the upper NW device 100 blocks unauthorized communication based on information regarding unauthorized communication notification of which is provided from the lower NW device 200, the lower NW device 200 acquires information related to communication of a terminal connected to the lower NW device 200, detects unauthorized communication based on the acquired information related to the communication of the terminal connected to the lower NW device 200, and notifies the upper NW device 100 of the detected information regarding unauthorized communication.
With such an information processing system, effects such as achievement of robust security can be obtained.
Furthermore, the information processing system 1 provides a zero trust security service unique to a provider (carrier). The zero trust security uses a configuration in which the underlay NW and the overlay NW cooperate to perform protection in an Information and Communication Technology (ICT) environment with increased complexity and cyber risk by new ways of working such as working remotely and new business expansion by utilization of Internet of Things (IoT) and the like.
The information processing system 1 provides a secure Network as a Service (NaaS) type ICT service closely linking the function of the overlay NW and the function of the underlay NW. A company that receives the service of the information processing system 1 can easily start, revise, and cancel the service of the information processing system 1 immediately by applying from a management portal site without spending a cost for Information Technology (IT) vendor outsourcing or spending a cost for NW design, making it possible to reduce operational cost taken from design to application.
Next, a configuration of the information processing system 1 will be described with reference to
The upper NW device 100 is a device that controls an upper network of the information processing system 1. The upper NW device 100 blocks unauthorized communication by using information regarding unauthorized communication notification of which is provided from the lower NW device 200.
The lower NW device 200 is a device that controls a lower network of the information processing system 1. The lower NW device 200 acquires information related to communication of a terminal (for example, Office Automation (OA) equipment, IoT equipment, and the like) connected to the lower NW device 200, detects unauthorized communication based on the acquired information, and notifies the upper NW device 100 of the information regarding unauthorized communication.
Next, a configuration of the upper NW device 100 will be described with reference to
The communication module 110 is implemented by a Network Interface Card (NIC) or the like, and enables communication between the control module 120 and an external device via a telecommunications link such as a Local Area Network (LAN) or the Internet. For example, the communication module 110 enables communication between the external device and the control module 120.
The storage module 130 is implemented by a semiconductor memory element such as Random Access Memory (RAM) or flash memory, or a storage device such as a hard disk or an optical disk. The information stored in the storage module 130 includes, for example, terminal information managed by the upper NW device 100, terminal information managed by the lower NW device 200, information related to communication of a terminal connected to the lower NW device 200, information related to unauthorized communication, information regarding detected unauthorized communication, other information necessary for detecting unauthorized communication, and other information necessary for blocking unauthorized communication. Here, the information related to unauthorized communication includes information such as the type, terminal information, and an IP address of a communication destination of unauthorized communication. Note that the information stored in the storage module 130 is not limited to the example described above.
The control module 120 is implemented by using a Central Processing Unit (CPU), a Network Processor (NP), a Field Programmable Gate Array (FPGA), or the like, and executes a processing program stored in the memory. As illustrated in
The blocker 121 blocks the unauthorized communication based on the information regarding the unauthorized communication notification of which is provided from the lower NW device 200. For example, blocker 121 blocks the communication of the unauthorized communication to the communication destination by using the information regarding the unauthorized communication notification of which is provided from the lower NW device 200. For example, the blocker 121 blocks unauthorized communication to the communication destination by using the information regarding the type and the IP address of unauthorized communication notification of which is provided by a notifier 223.
For example, the blocker 121 blocks communication of unauthorized communication to the communication destination using filtering by adding information regarding the IP address of the unauthorized communication destination notification of which is provided by the notifier 223 to the list of IP addresses that are not permitted to perform communication.
Next, a configuration of the lower NW device 200 will be described with reference to
The communication module 210 is implemented by an NIC or the like, and enables communication between the control module 220 and an external device via a telecommunications link such as a LAN or the Internet. For example, the communication module 210 enables communication between the external device and the control module 220.
The storage module 230 is implemented by a semiconductor memory element such as RAM or flash memory, or a storage device such as a hard disk or an optical disk. The information stored in the storage module 230 includes, for example, terminal information managed by the upper NW device 100, terminal information managed by the lower NW device 200, information related to communication of a terminal connected to the lower NW device 200, information related to unauthorized communication, information regarding detected unauthorized communication, and other information necessary for detecting unauthorized communication. Here, the information related to the unauthorized communication stored in the storage module 230 includes information obtained by analyzing communication content involving the lower NW device 200 together with information regarding past cyberattacks and the like stored in an external device (integrated security analysis platform). Note that the information stored in the storage module 230 is not limited to the example described above.
The control module 220 is implemented by using a CPU, an NP, an FPGA, or the like, and executes a processing program stored in the memory. As illustrated in
The acquirer 221 acquires information related to communication of a terminal connected to the lower NW device 200. For example, the acquirer 221 acquires information related to communication of OA equipment or IoT equipment connected to the lower NW device 200.
For example, the acquirer 221 acquires, as information related to communication, flow data including communication date/time, a connection destination IP address, and a connection source IP address.
The detector 222 detects unauthorized communication based on the information related to the communication of the terminal connected to the lower NW device 200 acquired by the acquirer 221. For example, the detector 222 detects unauthorized communication by performing matching between the information related to the communication of the terminal connected to the lower NW device 200 acquired by the acquirer 221 and the information related to unauthorized communication stored in the storage module 230.
The detector 222 may also detect unauthorized communication by performing matching between the information related to communication of the terminal connected to the lower NW device 200 transmitted from the lower NW device 200 and the information related to unauthorized communication stored in an external device.
Note that the detector 222 may detect the information itself regarding the unauthorized communication stored in the storage module 130 as unauthorized communication. For example, the detector 222 may detect, as unauthorized communication, information itself obtained by analyzing communication content related to the lower NW device 200 and stored in the storage module 130 together with information regarding past cyberattacks and the like stored in the external device.
For example, the detector 222 performs detection according to characteristics of the communication, such as abnormal traffic fluctuation and an abnormal traffic pattern, for example, as Internet Serves Provider (ISP) data collected in the underlay NW. Note that the detector 222 may use any existing detection method.
The notifier 223 notifies the upper NW device 100 of the information regarding the unauthorized communication detected by the detector 222. For example, as information regarding unauthorized communication detected by the detector 222, the notifier 223 notifies the upper NW device 100 of information such as a detection date/time, a detection type, a connection destination IP address, and a connection source IP address of the unauthorized communication.
In this manner, when unauthorized communication has been detected by the detector 222, the notifier 223 immediately notifies the upper NW device 100 of information regarding the unauthorized communication. Therefore, by adding an unauthorized IP address to the list of the IP addresses that are not permitted to perform communication, the upper NW device 100 can immediately reflect the information regarding the unauthorized communication onto overlay services, making it possible to allow the overlay NW and the underlay NW to cooperate with each other to improve the unauthorized communication detection accuracy.
Next, processing performed by the information processing system 1 will be described with reference to
First, the acquirer 221 of the lower NW device 200 acquires information related to communication of a terminal connected to the lower NW device 200. For example, the information related to communication of OA equipment, IoT equipment, or the like connected to the lower NW device 200 is acquired.
Subsequently, the detector 222 of the lower NW device 200 detects unauthorized communication based on the information related to the communication of the terminal connected to the lower NW device 200 acquired by the acquirer 221.
Subsequently, the notifier 223 of the lower NW device 200 notifies the upper NW device 100 of information regarding unauthorized communication detected by the detector 222.
The blocker 121 of the upper NW device 100 blocks the communication of the unauthorized communication to the communication destination based on the information regarding the unauthorized communication notification of which is provided by the notifier 223.
The blocker 121 cooperates with an external device, adds the IP address of a malicious terminal to the list, and performs filtering. For example, the blocker 121 uses a database that stores an IP address of a Command and Control server (C2) server discovered through analysis of flow data or analysis of Distributed Denial of Service (DDoS) in the underlay NW to perform access control according to an Access Control List (ACL) of a firewall being one of security functions of the UTM which is the upper NW device 100, and blocks communication to the C2.
In this manner, the upper NW device 100 intensively collects the detection result of the malicious flow detected in each underlay NW, adds the detection result to the list of the IP addresses not permitted to perform communication, and blocks unauthorized communication in the overlay NW, making it possible to increase the detection accuracy. Furthermore, even in a case where the user uses the overlay NW alone and the underlay NW is implemented by another company, the upper NW device 100 achieves blocking in the overlay NW, making it possible to accurately provide such a user with a service of blocking unauthorized communication.
Regarding the information processing system 1, the overlay NW and the underlay NW are provided by the same provider. In addition, the user who uses the information processing system 1 can perform flexible use of the system, for example, using only the overlay NW of this system and using the underlay NW of another company.
In this manner, the information processing system 1 allows the upper NW device 100 and the lower NW device 200 to closely cooperate with each other to detect and block unauthorized communication.
Detection/blocking processing performed by information processing system Next, detection processing and blocking processing performed by the information processing system 1 will be described with reference to
As illustrated in
For example, the storage module 230 stores information related to communication of a terminal connected to the lower NW device 200 and information related to unauthorized communication, such as a type of an unauthorized communication destination and an IP address, obtained by analyzing information and past DDoS attack information.
The detector 222 of the lower NW device 200 detects unauthorized communication by performing matching between the information related to the communication of the terminal connected to the lower NW device 200 acquired by the acquirer 221 and the information related to unauthorized communication stored in the storage module 230. At this time, the detector 222 may detect the information itself regarding the unauthorized communication stored in the storage module 130 as unauthorized communication. For example, the detector 222 detects the type “C2 server” and the IP address “203.0.113.15” as unauthorized communication.
The notifier 223 of the lower NW device 200 notifies the upper NW device 100 of the information regarding the unauthorized communication detected by the detector 222 (type “C2 server”, IP address “203.0.113.15”).
Subsequently, the blocker 121 of the upper NW device 100 blocks the communication of the unauthorized communication to the communication destination by using the information regarding the unauthorized communication notification of which is provided from the lower NW device 200. For example, as illustrated in
In this manner, the information processing system 1 allows the upper NW device 100 and the lower NW device 200 to cooperate with each other to detect unauthorized communication and block unauthorized communication.
Next, a flow of processing performed by the information processing system 1 will be described with reference to
First, the acquirer 221 of the lower NW device 200 acquires information related to communication of a terminal connected to the lower NW device 200 (Step S101). For example, the acquirer 221 acquires information related to communication of OA equipment or IoT equipment connected to the lower NW device 200.
Subsequently, the detector 222 of the lower NW device 200 detects unauthorized communication based on the information related to the communication of the terminal connected to the lower NW device 200 acquired by the acquirer 221 (Step S102). For example, the detector 222 detects unauthorized communication by performing matching between the information related to the communication of the terminal connected to the lower NW device 200 acquired by the acquirer 221 and the information related to unauthorized communication stored in the storage module 130.
The notifier 223 of the lower NW device 200 notifies the upper NW device 100 of the information regarding the unauthorized communication detected by the detector 222 (Step S103). For example, the notifier 223 notifies the upper NW device 100 of information such as a type and an IP address as the information regarding unauthorized communication detected by the detector 222.
The blocker 121 of the upper NW device 100 blocks the unauthorized communication based on the information regarding the unauthorized communication notification of which is provided by the notifier 223 (Step S104). For example, the blocker 121 blocks the communication of the unauthorized communication to the communication destination using the information regarding the unauthorized communication notification of which is provided by the notifier 223.
The information processing system 1 according to the embodiment is an information processing system including: the upper NW device 100 being a device constituting an overlay network; and a lower NW device 200 being a device constituting an underlay network. In this system, the upper NW device 100 includes the blocker 121 that blocks unauthorized communication based on information regarding unauthorized communication notification of which is provided from the lower NW device 200, and the lower NW device 200 includes: an acquirer 221 that acquires information related to communication of a terminal connected to the lower NW device 200; the detector 222 that detects unauthorized communication based on information related to communication of a terminal connected to the lower NW device 200 acquired by the acquirer 221; and the notifier 223 that notifies the upper NW device 100 of the information regarding unauthorized communication detected by the detector 222.
With this configuration of the information processing system 1, the lower NW device 200 detects unauthorized communication from the acquired information, notifies the upper NW device 100 of the information regarding the detected unauthorized communication and blocks the unauthorized communication, thereby achieving robust security.
In the information processing system 1 according to the embodiment, the detector 222 in the lower NW device 200 detects unauthorized communication by performing matching between the information related to the communication of the terminal connected to the lower NW device 200 acquired by the acquirer 221 and the information related to unauthorized communication stored in the storage module 230.
With this processing of detecting unauthorized communication by performing matching between the information related to the communication of the terminal connected to the lower NW device 200 and the information related to the unauthorized communication, the information processing system 1 can achieve robust security.
In the information processing system 1 according to the embodiment, the blocker 121 in the upper NW device 100 uses the information regarding the unauthorized communication notification of which is provided from the lower NW device 200 to block the communication of the unauthorized communication to the communication destination.
With this configuration of blocking communication of unauthorized communication to the communication destination using the information regarding unauthorized communication notification of which is provided, the information processing system 1 can achieve robust security.
It is also possible to create a program in which the processing executed by the information processing system 1 in the above embodiment is described in a language executable by a computer. In this case, by execution of the program by the computer, effects similar to those of the above embodiment can be obtained. Furthermore, the program may be recorded in a computer-readable recording medium, and the program recorded in the recording medium may be read and executed by the computer to implement processing similar to the above-described embodiment.
The memory 1010 includes read only memory (ROM) 1011 and RAM 1012. The ROM 1011 stores, for example, a boot program such as a Basic Input Output System (BIOS). The hard disk drive interface 1030 is connected to a hard disk drive 1090. The disk drive interface 1040 is connected to a disk drive 1100. For example, the disk drive 1100 is a drive into which a removable storage medium such as a magnetic disk or an optical disk is inserted. For example, the serial port interface 1050 is connected to a mouse 1110 and a keyboard 1120. For example, the video adapter 1060 is connected to a display 1130.
Here, as illustrated in
Furthermore, the information processing program is stored in the hard disk drive 1090 as, for example, a program module describing commands to be executed by the computer 1000. Specifically, the program module 1093 describing each processing to be executed by the computer 1000 described in the above embodiment is stored in the hard disk drive 1090.
Furthermore, data used for information processing performed by the information processing program is stored as program data in the hard disk drive 1090, for example. The CPU 1020 reads the program module 1093 and the program data 1094 stored in the hard disk drive 1090 to the RAM 1012 as necessary, and executes each procedure described above.
The program module 1093 and the program data 1094 related to the information processing program are not limited to the form of being stored in the hard disk drive 1090, and may be stored in a removable storage medium and read by the CPU 1020 via the disk drive 1100 or the like, for example. Alternatively, the program module 1093 and the program data 1094 related to the control program may be stored in another computer connected via a network such as a LAN or a Wide Area Network (WAN) and read by the CPU1020 via the network interface 1070.
Various embodiments, described herein in detail with reference to the drawings as a plurality of embodiments, are merely examples and are not intended to limit the present invention to the plurality of embodiments. The features described herein may be implemented by various methods, including various modifications and improvements based on the knowledge of those skilled in the art.
In addition, the “terms such as a module, a part, or a noun with suffix -er or suffix -or)” described above can be read as a unit, a means, a circuit, or the like. For example, a communication module, a control module, and a storage module can be replaced with a communication unit, a control unit, and a storage unit, respectively.
According to the present invention, it is possible to achieve robust security.
Although the invention has been described with respect to specific embodiments for a complete and clear disclosure, the appended claims are not to be thus limited but are to be construed as embodying all modifications and alternative constructions that may occur to one skilled in the art that fairly fall within the basic teaching herein set forth.
Number | Date | Country | Kind |
---|---|---|---|
2023-033209 | Mar 2023 | JP | national |
This application is a continuation application of International Application No. PCT/JP2023/024528, filed on Jun. 30, 2023, which claims the benefit of priority of the prior Japanese Patent Application No. 2023-033209, filed on Mar. 3, 2023, the entire contents of each are incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/JP2023/024528 | Jun 2023 | WO |
Child | 18916736 | US |