네트워크 보안 서비스 향상을 위한 도메인 구조설계와 성능분석 방법

A Study for a Method of Designing of Security Domain Infrastructure and Its Efficiency Measuring

  • 투고 : 2010.07.14
  • 심사 : 2010.09.30
  • 발행 : 2010.09.30

초록

네트워크 보안에서의 효율성은 침입차단 성능과 시스템 performance로 대표된다. 네트워크 보안의 성능 향상을 위해서는 네트워크 인프라스트럭쳐에서의 기능적인 효율성을 우선 확보해야 한다. 그동안 네트워크 보안 효율성 제고 달성에 관한 많은 방법론들이 연구되었다. 이 같은 연구의 목적은 인프라스트럭쳐에서의 효율성 메커니즘 구현을 통해 빠른 응답시간내에 보다 우수한 침입차단을 실현하는 것이다. 이를 위해서 네트워크 보안 도메인 효율성 구조를 설계하고 구조별 효율성 측정방법을 연구함으로써 인프라스트럭쳐상에서의 보안방법론 모델을 제안하였다. 본 연구에서 제안한 방법론을 통해 체계적인 도메인 설계와 측정방법을 실시할 경우 운용인프라스트럭쳐 시스템상에서 보안 효율성 확보가 가능함이 입증되었다.

On intranet system, it is essential element for providing information to decrease response time. To realize this efficiencies of response time of the network, a lot of research have been conducted. The purpose of the research and implementation is to shorten the response time of information system. We can realize final goal of information system through fast response time. This final goal of information system is to secure the performance efficiency within the required time. In order to acquire the method of warranty of fast response time, the efficient measurement method is essential. This research suggests a latency test techniques being used on infrastructure system and also offers a response time measurement methodology. Methodology proposed in this research has proven that it is possible to measure response time through the scheduled method. Also it is possible to develop a enhanced networking capabilities, and information system capabilities for the development of information system.

키워드

참고문헌

  1. 김태경.서희석.김희완, 서비스 응답시간 보장을 위한 패킷 손실에 관한 연구, 2005
  2. 김태성, 이금석, 웹 어플리케이션 응답시간 모니터링 API의 설계 및 구현,2000
  3. 장윤정, "L7 스위치로 네트워크 활용도를 높여라", 네트워크타임스, 2003.
  4. Sichoon Noh, Dong Chun Lee, and Kuimam J.Kim, "Improved Structure Management of Gateway Firewall Systems for Effective Networks Security", Springer, 2003.
  5. Sichoon Noh, Dong Chun Lee, and Kuima m J.Kim, "ImprovedStructure Management of Gateway Firewall Systems for Effective Networks Security", Springer, 2003.
  6. D. Yoon and K. Cho, "General bit error probability of rectangular quadrature amplitude modulation," IEE Electronics Letters, Vol. 38, no. 3, pp. 131-132, January 2002. https://doi.org/10.1049/el:20020093
  7. J. K. Kwon, S. Park and D. K. Sung, "Log-likelihood ratio(LLR) conversion schemes in orthogonal code hopping multiplexing," IEEE Comm. Letters, vol. 7, no. 3, pp. 104-106, Mar. 2003. https://doi.org/10.1109/LCOMM.2003.809994
  8. Sichoon,Noh,Dong Chun Lee,"Multi-Level Protection Building for Virus Protection Infrastructure", SCIE LNCS 3036,2004.6
  9. Sichoon,Noh,Dong Chun Lee,"Assurance Method of High Availability inInformation Security Infrastructure System", SCIE LNCS 3794,2005.12
  10. Sichoon,Noh,"Building of an Integrated Multilevel Virus Protection Infrastructure ", IEEE Computer Society,2005.12.
  11. Sichoon,Noh,"A Securing Method of Multispectral Protection Infrastructure for Malicious Traffic in Intrne System", DCS, 2006.02
  12. Sichoon,Noh,Dong Chun Lee,Kuimam J.Kim"Protection Structure Building for Malicious Traffic Protecting in Intrnwt Systems",SCIE LNCS3981,2006.05
  13. Sichoon,Noh,"Active-Active High Availability of Information Infrastructure System for Effective Network Security", IEEE Computer Society,2008.01
  14. Sichoon,Noh,"MSPI(Multi-Spectral Protection Infrastructure) System fo Optimal Network Security", IEEE Computer Society,2008.08
  15. Paul Woosnam, "10 hottest Technologies",Telecommunications, 2003.4
  16. Peter Sevcik, "Internet Traffic and Performance", NetForecast, 2001
  17. ITU-T Rec. E.417, "Framework for the Network Management of IP-Based Networks,"Feb. 2001.
  18. ITU-T Rec. Y.1221,"Traffic Control and Con gestion Control inIPBased Networks,"March 2002.