Design and Implementation of Intrusion Detection System of Packet Reduction Method

패킷 리덕션 방식의 침입탐지 시스템 설계 및 구현

  • Received : 2005.06.08
  • Accepted : 2005.06.28
  • Published : 2005.08.31

Abstract

Many researchers have proposed the various methods to detect illegal intrusion in order to improve internet environment. Among these researches, IDS(Intrusion Detection System) is classified the most common model to protect network security. In this paper, we propose new log format instead of Apache log format for SSL integrity verification. We translate file-DB log format into R-DB log format. Using these methods we can manage Web server's integrity, and log data is transmitted verification system to be able to perform both primary function of IDS and Web server's integrity management at the same time. The proposed system in this paper is also able to use for wire and wireless environment based on PDA.

Keywords

References

  1. 이종후, 류재철 '인터넷 보안', Telecommunication Review, 제 10권 5호, 2000
  2. George Reese, Randy Jay Yarger, Tim King, 'Managing & Using MySQL, 2nd Edition', O'Reilly, 2002. 4
  3. Horie, T., Harada, T., Tanaka, K., 'Adaptive Access Policy for the Linux Kernel', Applications and the Internet Proceedings. pp.82-88, 2005. 1
  4. 김창수, '네트워크 기반의 침입탐지 시스템', 부경대학교 연구보고서, 2002. 6
  5. J.Viega, M. Messier, P. Chandra, 'Network Security with OpenSSL', O'REILLY, 2002. 6
  6. R Magnus, U Kunitz, M Dziadzka, DVerworner, M Beck, H Bohme 'Linux Kernel Internals' pp.258-315, 1999
  7. Stephen Northcutt, Judy Novak,'Network Intrusion Detection An Analyst's Handbook', Information Publish, 2001
  8. Wagner,D. and Scheneier,B. , 'Analysis of the SSL 3.0 Protocol', 2nd USENIX Workshop on Electronic Commerce Proceedings, 1996
  9. 정관진, '아파치 로그파일의 이해와 분석', http://www.apache.kr.net/documents/log_storyII.html
  10. 이영무, '최강 MySQL 바이블', 가메출판사, 2003. 3
  11. 한국정보보호진흥원 '3월 해킹바이러스 통계 및 분석 월보' 2004. 3
  12. Eric Rescorla 'SSL and TLS', Addison- Wesley Press, 2001