빅 데이터와 통합보안 2.0

Big Data and Enterprise Security 2.0

  • 발행 : 2012.06.15

초록

키워드

참고문헌

  1. 이성희, "Big Data의 이해-가치와 도입전략", 한국정보기술학회지, 제10권, 제1호, pp.63-68, 2011.
  2. 정용찬, "빅데이터 혁명과 미디어 정책이슈", 정보통신정책연구원, 2012.
  3. IDG, "빅 데이터의 이해", IDG Tech Report, 2012.
  4. McKinsey Global Institute, "Big data : The next frontier for innovation, competition, and productivity", McKinsey & Company, 2011.
  5. Ventana Research, "Using Big Data to Deliver Real-Time Insights for IT and the Business", 2011.
  6. Splunk, "Splunk, Big Data and the Future of Security", White Paper, 2011.
  7. 이규재, "빅데이터를 위한 플랫폼들", http://helloworld.naver.com /helloworld/29533, 2012.
  8. Michael Driscoll, "Building data startups: Fast, big, and focused", http://radar.oreilly.com/2011/08/building-data-startups.html, 2011.
  9. Tom White, Hadoop Definitive Guide, O'Reilly Media, 2009.
  10. HP, "Next-Generation Application Monitoring: Combining Application Security Monitoring and SIEM", White Paper, 2011.
  11. 남기효, 김윤홍, 권환우, "최신 정보보호기술 동향: APT 및 그 대응", 주간기술동향, pp.14-25, 2011.
  12. Help Net Security, "The next step in BYOD Security", http://www.net-security.org/article.php?id=1700, 2012.
  13. Neil Roiter, "Next-generation firewalls: In depth", http://www.csoonline.com/article/691651/next-generationfirewalls- in-depth, 2011.
  14. Martignoni, L., Stinson, E., Fredrikson, M., Jha, S. and Mitchell, J., "A Layered Architecture for Detecting Malicious Behaviors", RAID, 2008.
  15. R. Koch, "Towards Next-Generation Intrusion Detection", 3th Inter-national Conference on Cyber Conflict, pp.151-168, 2011.
  16. Wei-Yu Chen, and Jazz Wang, "Building a Cloud Computing Analysis System for Intrusion Detection System", CLOUD SLAM, 2009.
  17. 최대수, 문길종, 김용민, 노봉남, "MapReduce를 이용한 대용량 보안로그 분석", 한국정보기술학회 논문지, 제9권, 제8호, pp.125-131, 2011.