원문정보
A Study on the Intrusion Detection Method using Firewall Log
초록
영어
According to supply of super high way internet service, importance of security becomes more emphasizing. Therefore, flawless security solution is needed for blocking information outflow when we send or receive data. Large enterprise and public organizations can react to this problem, however, small organization with limited work force and capital can"t. Therefore they need to elevate their level of information security by improving their information security system without additional money. No hackings can be done without passing invasion blocking system which installed at the very front of network. Therefore, if we manage isolation log effective, we can recognize hacking trial at the step of pre-detection. In this paper, it supports information security manager to execute isolation log analysis very effectively. It also provides isolation log analysis module which notifies hacking attack by analyzing isolation log.
목차
1. 서론
2. 방화벽 기능
3. 차단로그를 활용한 공격정보 해석
3.1 차단 정책 설정
3.2 차단로그를 활용한 공격유형 분석
3.3 차단로그 분석규칙 정의
3.4 차단로그 분석체계 구성
3.5 기존 로그분석모듈과의 비교
4. 결론 및 향후 연구과제
참고문헌