earticle

논문검색

방화벽 로그를 이용한 침입탐지기법 연구

원문정보

A Study on the Intrusion Detection Method using Firewall Log

윤성종, 김정호

피인용수 : 0(자료제공 : 네이버학술정보)

초록

영어

According to supply of super high way internet service, importance of security becomes more emphasizing. Therefore, flawless security solution is needed for blocking information outflow when we send or receive data. Large enterprise and public organizations can react to this problem, however, small organization with limited work force and capital can"t. Therefore they need to elevate their level of information security by improving their information security system without additional money. No hackings can be done without passing invasion blocking system which installed at the very front of network. Therefore, if we manage isolation log effective, we can recognize hacking trial at the step of pre-detection. In this paper, it supports information security manager to execute isolation log analysis very effectively. It also provides isolation log analysis module which notifies hacking attack by analyzing isolation log.

목차

Abstract
 1. 서론
 2. 방화벽 기능
 3. 차단로그를 활용한 공격정보 해석
  3.1 차단 정책 설정
  3.2 차단로그를 활용한 공격유형 분석
  3.3 차단로그 분석규칙 정의
  3.4 차단로그 분석체계 구성
  3.5 기존 로그분석모듈과의 비교
 4. 결론 및 향후 연구과제
 참고문헌

저자정보

  • 윤성종 Sung-Jong Yoon. 한밭대학교 정보통신전문대학원 컴퓨터공학과
  • 김정호 Jeong-Ho Kim. 한밭대학교 정보통신전문대학원 컴퓨터공학과 교수

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 기관로그인 시 무료 이용이 가능합니다.

      • 4,500원

      0개의 논문이 장바구니에 담겼습니다.