Web-Browsing Application Using Web Scraping Technology in Korean Network Separation Application
Abstract
:1. Introduction
2. Related Works
2.1. Science of Security (SoS)
2.2. Security Assessment Model for Network Separation
2.3. Network Separation Implementation Methods
2.4. Research Trend Analysis on Network Separation
3. Proposed Network Separation Protocol
3.1. Requirements Analysis
3.1.1. Laws Related to Network Separation in Korea
3.1.2. Configuration of Network Connection System and Its Limitations
3.1.3. Definition of Major Vulnerabilities and Defense System That Occur in Web Browsing
3.2. Network Flow Design
3.2.1. Diagram of the Network Flow Sequence of the Proposed Model
- a.
- Wait for the URL forwarding message.
- b.
- Read the message when it is delivered.
- c.
- Render the page using the Headless browser library.
- d.
- Download the web according to the requested renderType.
- e.
- Move the file to the sync folder.
- f.
- Move the sync folder internally via data exchange.
- g.
- Run the received file (for PDF files, open it with a browser).
3.2.2. Designation of DNS
3.2.3. Definition of URL Forwarding Message Protocol
4. Implementation and Test Analysis
4.1. Web-Browsing Application Implementation
4.2. Analysis of Malicious Code Safety
5. Conclusions and Future Plans
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Kim, C.S. Policy Study on Elimination of Unnecessary Traffic in Network Detachment Environment. Master’s Thesis, Korea University, Seoul, Korea, 2019. [Google Scholar]
- Pavithra, P.; Hartwig, H.; David, L. Network Structure and Spatial Separation. Environ. Plan. B Urban Anal. City Sci. 2012, 39, 137–154. [Google Scholar]
- Henner, V.E. A network separation scheme for emergency control. Int. J. Electr. Power Energy Syst. 1980, 2, 109–114. [Google Scholar] [CrossRef]
- Lee, H.J.; Cho, D.I.; Kou, K.S. A Study of Unidirectional Data Transmission System Security Model for Secure Data transmission in Separated Network. Asia Pac. J. Multimed. Serv. Converg. Art Humanit. Sociol. 2015, 5, 539–549. [Google Scholar] [CrossRef]
- Rajendra, P.; Harsha, D.; Chirag, M. Designing an efficient security framework for detecting intrusions in virtual network of cloud computing. Comput. Secur. 2019, 85, 402–422. [Google Scholar]
- Lee, D.H.; Kim, H.K. Real-time security Monitoring assessment model for cybersecurity vulnerabilities in network separation situations. J. Inf. Secur. 2021, 21, 45–53. [Google Scholar]
- ISO 27001 Network Segmentation Overview. Available online: https://iso27001guide.com/iso-27001-network-segmentation-overview-iso27001-guide-iso27001-guide.html (accessed on 26 May 2021).
- Jung, W.C.; Park, N. A Safe Web in Network Separation Environment. J. Comput. Theor. Nanosci. 2020, 17, 3243–3249. [Google Scholar] [CrossRef]
- Jung, W.C.; Park, J.; Park, N. Safe Web Using Scrapable Headless Browser in Network Separation Environment. J. Korea Soc. Comput. Inf. 2019, 24, 77–85. [Google Scholar]
- Hwang, S.K. Network separation construction method using network virtualization. J. Korea Inst. Inf. Commun. Eng. 2020, 24, 1071–1076. [Google Scholar]
- Kim, I.Y.; Lim, H.T.; Ji, D.B.; Park, J.P. A Efficient Network Security Management Model in Industrial Control System Environments. Korea Acad. Ind. Coop. Soc. 2018, 19, 664–673. [Google Scholar]
- Jee, J.E.; Lee, S.G.; Lee, S.R.; Bae, B.C.; Shin, Y.T. A Logical Network Partition Scheme for Cyber Hacking and Terror Attacks. Korean Inst. Inf. Sci. Eng. 2012, 39, 95–101. [Google Scholar]
- Act on the Protection of Information and Communications Infrastructure. Available online: https://www.law.go.kr/LSW/lsInfoP.do?lsiSeq=136754&viewCls=engLsInfoR&urlMode=engLsInfoR&chrClsCd=010202&lsId=009182#0000 (accessed on 19 August 2021).
- Personal Information Protection Act. Available online: https://elaw.klri.re.kr/eng_mobile/viewer.do?hseq=53044&type=lawname&key=personal+information (accessed on 19 August 2021).
- Electronic Financial Trans-Actions Act. Available online: https://elaw.klri.re.kr/kor_service/lawView.do?hseq=44455&lang=ENG (accessed on 19 August 2021).
- Enforcement Decree of the Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc. Available online: https://elaw.klri.re.kr/kor_mobile/viewer.do?hseq=42587&type=part&key=43 (accessed on 19 August 2021).
- Jung, W.C. Technical Scheme for Network Separation: Focusing on the Web Data Transmission. Master’s Thesis, Jeju National University, Jeju, Korea, 2020. [Google Scholar]
- Ali, M.; Pierluigi, N.; Alberto, L.S.V.; Jan, M.R. Optimized Design of a Human Intranet Network. In Proceedings of the 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC), Austin, TX, USA, 18–22 June 2017. [Google Scholar]
- Cho, B.J.; Yun, J.H.; Lee, K.H. Study of effectiveness for the network separation policy of financial companies. J. Korea Inst. Inf. Secur. Cryptol. 2015, 25, 181–195. [Google Scholar]
- CVE-2014-6271. Available online: https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-6271 (accessed on 26 May 2021).
- CVE-2014-6277. Available online: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277 (accessed on 26 May 2021).
- CVE-2014-6278. Available online: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 (accessed on 26 May 2021).
- CVE-2017-5638. Available online: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5638 (accessed on 26 May 2021).
- Arpana, K.; Vivek, K. Competing secure text encryption in intranet using elliptic curve cryptography. J. Discret. Math. Sci. Cryptogr. 2020, 23, 631–641. [Google Scholar]
- A9:2017-Using Components with Known Vulnerabilities. Available online: https://owasp.org/www-project-top-ten/2017/A9_2017-Using_Components_with_Known_Vulnerabilities (accessed on 26 May 2021).
- CWE-20: Improper Input Validation. Available online: https://cwe.mitre.org/data/definitions/20.html (accessed on 26 May 2021).
- CWE-190: Integer Overflow or Wraparound. Available online: https://cwe.mitre.org/data/definitions/190.html (accessed on 26 May 2021).
Level | Value | Detail |
---|---|---|
L5 | Very High | It can cause great damage to the internal network, Causes fatal side effects to server operation |
L4 | High | It can cause damage to the internal network, Causes side effects to server operation |
L3 | Moderate | It can cause great damage to the external network, The service may be restricted, Damage spreads to the internal network |
L2 | Low | It may cause damage to the external network, and restrict some services. |
L1 | Very Low | It may cause little damage to the external network and affect some services. |
Law/Regulation | Legal Text |
---|---|
ACT ON THE PROTECTION OF INFORMATION AND COMMUNICATIONS INFRASTRUCTURE [13] | Article 5 (Establishment of Measures to Protect Critical Information and Communications Infrastructure) (1) The head of an organization that manages critical information and communications infrastructure (hereafter referred to as “management organization”) shall formulate and implement management measures, including physical and technological measures, such as those for incident prevention, backup, and recovery to securely protect critical information and communications infrastructure and management information under his or her jurisdiction (hereafter referred to as “measures to protect critical information and communications infrastructure”), based on the outcomes of the analysis and evaluation of vulnerabilities under Article 9 (1) or (2). |
PERSONAL INFORMATION PROTECTION ACT [14] | Article 29 (Duty of Safeguards) Every personal information controller shall take such technical, managerial, and physical measures as establishing an internal management plan and preserving access records, for example. that are necessary to ensure safety as prescribed by Presidential Decree so that the personal information may not be lost, stolen, divulged, forged, altered, or damaged. |
Article 30 (Establishment and Disclosure of Privacy Policy) (1) Every personal information controller shall establish a personal information processing policy including the following matters (hereafter referred to as “Privacy Policy”). In such cases, public institutions shall establish the Privacy Policy for the personal information files to be registered pursuant to Article 32: | |
ELECTRONIC FINANCIAL TRANSACTIONS ACT [15] | Article 21 (Duty to Ensure Safety) (1) A financial company or an electronic financial business entity and its or his or her subsidiary electronic financial business entity (hereafter referred to as “financial company, for example.”) shall perform its or his or her duties of a good manager to ensure the safe processing of electronic financial transactions. (2) In order to ensure the safety and reliability of electronic financial transactions, a financial company for example. shall comply with the standards determined by the Financial Services Commission with respect to the information technology sector, such as human resources, facilities, electronic apparatus, and expenses for conducting electronic transmissions or processing, the electronic financial affairs and certification methods including the use of certificates under the Digital Signature Act. |
ENFORCEMENT DECREE OF THE ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND INFORMATION PROTECTION, FOR EXAMPLE [16]. | Article 15 (Protective Measures for Personal Information) (2) Each provider of information and communications services shall take the following measures to block illegal access to personal information pursuant to |
Article 28 (1) 2 of the Act: Provided, that a provider of information and communications services is obliged to take a measure under subparagraph 3, only if the number of users whose personal information has been stored and managed by the provider of information and communications services during three months immediately preceding the end of the previous year averages at least one million persons per day or the sales of information and communications services during the preceding year (referring to the preceding business year, if the service provider is a corporation) amount to at least ten billion won: 3. Blockade of external Internet networks to computers, for example. of persons accessing the personal information processing system while handling personal information; |
Rank | Vulnerability | Detail Description | Exploit | OWASP | MITRE |
---|---|---|---|---|---|
1 | CVE-2014-6271 | Execution of arbitrary code through crafted environment | (){:;};ping-c1-p cb18cb3f7bca4441a595fcc1e 240deb0 attacker-machine.com | A9 | 11 |
2 | CVE-2014-6278 | Execution of arbitrary code through crafted environment | () {:;}; /bin/sleep 20|/sbin/sleep 20|/usr/bin/sleep 20 | ||
3 | CVE-2014-6277 | Execution of arbitrary code through crafted environment | ‘f() { x() { _;}; x() { _;} < | ||
4 | CVE-2017-5638 | Remote execution of arbitrary commands through crafted content-type HTTP header | payload += “(#cmd = ‘%s’).” % cmd try:headers = {‘User-Agent’:‘Mozilla/5.0’,’Content-Typ e’: payload} | 3 |
Web Page Rendering | Anti-Vaccine, SandBox Inspection Time | Transmission Time | |
---|---|---|---|
Manual capture method | 3 s | more than 60 s | 10 s |
Automated scraping method | same as above | Not applicable | same as above |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jung, W.-C.; Kim, J.; Park, N. Web-Browsing Application Using Web Scraping Technology in Korean Network Separation Application. Symmetry 2021, 13, 1550. https://doi.org/10.3390/sym13081550
Jung W-C, Kim J, Park N. Web-Browsing Application Using Web Scraping Technology in Korean Network Separation Application. Symmetry. 2021; 13(8):1550. https://doi.org/10.3390/sym13081550
Chicago/Turabian StyleJung, Won-Chi, Jinsu Kim, and Namje Park. 2021. "Web-Browsing Application Using Web Scraping Technology in Korean Network Separation Application" Symmetry 13, no. 8: 1550. https://doi.org/10.3390/sym13081550
APA StyleJung, W. -C., Kim, J., & Park, N. (2021). Web-Browsing Application Using Web Scraping Technology in Korean Network Separation Application. Symmetry, 13(8), 1550. https://doi.org/10.3390/sym13081550