1. Field of the Invention
The present invention relates generally to a worm blocking system including a dedicated hardware-based board for performing pattern matching without a change in an existing network environment, which is installed in front of a network to be protected, inspects whether worm-related patterns exist on all packets on communication lines without loss or delay, passes packets through the system or blocks packets according to corresponding security rules and informs an administrator of results in real time, and a worm blocking method. In particular, the present invention relates to a hardware-based system and method for detecting and blocking worm-related packets, which is suitable for a gigabit environment.
2. Description of the Related Art
Worms are program pieces that move between programs in a single computer system or automatically spread to other computers through a network. Unlike viruses, worms do not have specific infection objects and do not include code that directly destruct computer systems or causes the incorrect operations of the computer systems. However, since the worms impose excessive loads on the computer systems and the network while spreading, the worms may cause computer systems or networks downtime. In particular, while the worms do not have specific infection objects, the worms spread based on random information obtained from infected objects so that the worms are characterized in that it is almost impossible to control or manage the worms using any conventional methods after the worms are released from sources to the network.
Computer viruses are malicious programs that infiltrate into computers, and damage data or cause other programs become inoperable. The computer viruses are characterized in that they have infection objects, infect current infection objects and reproduce themselves to infect other infection objects.
Worm viruses are viruses into which the above-described worms and computer viruses are combined, and are characterized in that the computer viruses rapidly spread using the worms. In practice, the spreading speed of the worm viruses is so fast and destructive that worm viruses, which were initially reported in a foreign country, spread into Korea in only several hours and infect tens of thousands of computers less than one day after the worm viruses begin to spread into Korea. Recently, hacking tools, such as Back Doors, and spyware functions, such as Trojans, are added to the worm viruses in addition to the basic functions of worms and computer viruses. The function and destructive power of the worm viruses are being enhanced, the spreading speed of the worm viruses is increasing, and the cash value of the damage they cause is increasing enormously.
Accordingly, various methods of blocking worms or worm viruses have been used.
Generally, to block worms, vaccine programs are installed on individual hosts, or software-based virus blocking systems are installed to prevent worms from infiltrating into computer networks in advance. Furthermore, in the case of an L7 application switch, worm attacks can be blocked using content filtering.
In the past, in the case of installing vaccine programs on hosts, functions of detecting whether data and files which will be transmitted to the hosts, are infected by worms and curing are performed. In the case of a gateway-level virus blocking system, functions of detecting whether data and files have been infected and curing are performed on all traffics to fundamentally prevent viruses or malicious information from entering into or exiting from a gateway that is a start point of a network. In the case of an L7 application switch, pattern matching related to worm attacks is performed on the data parts of passing packets on an application level, and the L7 application switch can protect against worm attacks by blocking attack packets if the packets are determined to be the attack packets. In the case where the worm attacks are blocked by installing host-based vaccine programs, there arises a problem in that an administrator encounters management difficulties as the size of a network increases. In the case where the worm attacks are blocked by installing a gateway-level virus blocking system, loads imposed on the virus blocking system increase as traffic increases because the blocking system is implemented based on software, thus causing problems of a reduction in speed, etc. Similarly, in the case where the worm attacks are blocked using the L7 application switch, there are problems in that performance can be lowered and the system may be stopped at the time of performing the content filtering.
Accordingly, the present invention has been made keeping in mind the above problems occurring in the prior art, and an object of the present invention is to provide a worm blocking system including a dedicated hardware-based board for performing pattern matching without a change in an existing network environment, which is installed in front of a network to be protected, inspects whether worm-related patterns exist on all packets on communication lines without loss or delay, passes packets through the system or blocks packets according to corresponding security rules and informs an administrator of results in real time, and a worm blocking method. In particular, the present invention relates to a hardware-based system and method for detecting and blocking worm-related packets which is suitable for a gigabit environment.
In order to accomplish the above object, the present invention provides a worm packet detection and blocking system using hardware-based pattern matching, including a host system connected behind a gateway in a transparent mode and installed in front of the client or server of a network to be protected against worm attacks in order to block the worm attacks, and a Peripheral Component Interconnect (PCI) board mounted in the host system, adapted to perform pattern matching on received packets according to security rules received from the host system, and adapted to block a matching packet according to a corresponding security rule.
The worm packet detection and blocking system may further include a management console for transmitting the security rules to the host system, receiving a worm alert signal from the host system and displaying the worm alert signal.
The host system may be a general computer equipped with a network card. The PCI board may include a header search engine for checking the header of a packet, a content search engine for performing pattern matching, an In Line-Control (ILC) in charge of packet processing, and a security rule database for storing the security rules. The ILC may transmit an input data packet to the header search engine and the content search engine for pattern matching of a header and a content, transmit an alert signal to the host system when a worm pattern is detected as a result of the pattern matching in the header and content search engines, read a security rule corresponding to the detected worm pattern from the security rule database, and pass or block the packet according to the security rule.
In order to accomplish the above object, the present invention provides a worm packet detection and blocking method using a worm blocking system formed of a host system and a PCI board mounted on the host system, including the steps of the host system initializing the PCI board, the PCI board storing worm patterns and corresponding security rules when the host system transmits the worm patterns and the security rules to the PCI board, the PCI board searching for a worm by comparing the pattern of input data and the stored worm patterns, the PCI board transmitting an alert signal to the host system when the worm pattern is detected, and the PCI board searching the stored security rules for a security rule corresponding to the detected worm pattern and processing the worm according to the security rule.
The security rules may be transmitted to the host system from a management console connected to the worm blocking system through a network. It may be preferable that the security rules transmitted to the host system from the management console have been encrypted, and the host system decrypts the received security rules before transmitting the security rules to the PCI board.
The above and other objects, features and advantages of the present invention will be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings, in which:
a is a block diagram showing the internal construction of a PCI board;
b is a flowchart showing the function of the PCI board;
Reference now should be made to the drawings, in which the same reference numerals are used throughout the different drawings to designate the same or similar components.
A preferred embodiment of the present invention is described in detail with reference to the attached drawings below.
A configuration diagram showing the construction of a system for blocking worms using hardware-based pattern matching in a gigabit environment is shown in
In
The worm blocking system 40 includes a host system and a PCI format board mounted in the host system. The host system takes a general computer form, but practically functions to receive log information provided by the PCI format board and transmit the log information to the management console 50 using the PCI BUS. The PCI board for performing pattern matching is provided with a gigabit interface, so that it is possible to install the PCI board in an In-line mode without a change in a network environment. The PCI board uses the network interface of a host computer when communicating with the management console 50. The host system is connected to the management console 50 via the Internet using Transmission Control Protocol/Internet Protocol (TCP/IP), and a single management console can remotely manage a plurality of worm blocking systems.
If no log received from the worm blocking system 40 exists at step A1, and an administrator intends to transmit security rules including worm-related pattern and policy at step A4, the management console 50 encrypts the security rules to be transmitted at stop A5 and transmits the encrypted security rules to a corresponding worm blocking system 40 at step A6. If the process does not end at step A7, functions of steps A1 to A6 are repeated.
If the security rules received from the management console 50 do not exist, it is inspected whether information on the fact that a worm attack packet is detected is transmitted from the PCI board in charge of hardware-based pattern matching at step B6. If the information on the worn attack packet is received from the PCI board, the host system converts the information into a log type to be used in the management console 50 at step B7 encrypts the information using the SEED algorithm at step B8, and transmits the encrypted information to the management console 50 at step B9. The steps are repeated until the operation of the host system ends at step B10.
a is a block diagram showing the internal construction of the PCI board dedicated to pattern matching. The PCI board includes a header search engine 430 for checking the header of a packet, a content search engine 450 for performing pattern matching, an ILC 410 in charge of packet processing, and a security rule database 470.
b is a functional flowchart of the PCI board. When the PCI board is initialized at step B1 of
Meanwhile, even though not shown in
As described above, the present invention can detect and block packets including worm attack patterns, in real time using a hardware-based PCI card without loss or delay of the packets, thus effectively protecting against worm attacks. Furthermore, the present invention can be installed without a change in an existing network, so that it is convenient to manage. Furthermore, the management console and the worm blocking system perform encryption and decryption using the SEED algorithm, so that the management console and the worm blocking system Call safely communicate with each other.
Although the preferred embodiments of the present invention have been disclosed for illustrative purposes, those skilled in the art will appreciate that various modifications, additions and substitutions are possible, without departing from the scope and spirit of the invention as disclosed in the accompanying claims.
Number | Date | Country | Kind |
---|---|---|---|
2003-61541 | Sep 2003 | KR | national |