References
- H. O. Koo, S. H. Baek, and C. S. Oh, "Effective traffic analysis in DDoS attack", Journal of the Korea Contents Society, Vol. 2, No. 1, pp. 268-272, May 2004
- T. Y. Shim, I. J. Choi, J. I. Lee, B. K. Hong, and C. S. Oh, "Methodology for DDoS Detection Using Pattern Matching in Distributed Environment", Journal of the Korea Institute of Information Technology, Vol. 11, No. 8, pp. 101-110, Jul. 2013
- M. Kaeo, Designing Network Security, 2nd ed. Cisco Press, pp. 343-353, Mar. 2004
- D. S. Moon, H. S. Lee, and I. K. Kim, "Host based Feature Description Method for Detecting APT Attack", Journal of the Korea Institute of Information Security & Cryptology, Vol. 24, No. 5, pp. 839-850, Oct. 2014 https://doi.org/10.13089/JKIISC.2014.24.5.839
- I. S. Jeon, K. H. Han, D. W. Kim, and J. Y. Choi, "Using the SIEM Software vulnerability detection model proposed", Journal of the Korea Institute of Information Security & Cryptology, Vol. 24, No. 4, pp. 961-974, Aug. 2015
- S. J. Lee and D. H. Lee, "Real time predictive analytic system design and implementation using Big Data-log" Journal of the Korea Institute of Information Security & Cryptology, Vol. 25, No. 6, pp. 1399-1410, Dec. 2015 https://doi.org/10.13089/JKIISC.2015.25.6.1399
- D. K. Kim, S. B. Pyo, and C. H. Kim, "Study on APT Attack response Techniques Based on Big Data Analysis", The Society of Convergence Knowledge Transactions, Vol. 4, No. 1, pp. 29-34, Jan. 2016
- J. S. Hong, Y. H. Lim, W. H. Park, and K. H. Kook, "Improved Security Monitoring and Control Using Analysis of Cyber Attack in Small Businesses", Journal of Society for e-Business Studies, Vol. 19, No. 4, pp. 195-204, Nov. 2014
- Verizon. 2012 Data Breach Investigations Report [Internet]. Available: http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2012-ebk_en_xg.pdf
- H. J. Kim, J. H. Hyun, H. J. Lee, P. J. Park, and A. L. Lee, The 4th Industrial Revolution Futures technology and Security of Company, 1st ed. InfoTheBooks, pp. 61-73, Jan. 2017
- D. J. Jeon and D. G. Park, "Analysis Model for Prediction of Cyber Threats by Utilizing Big Data Technology", Journal of Korea Institute of Information Technology Vol. 12, No. 5, pp. 81-100, May 31. 2014
- S. J. Moon, "Server Management Prediction System based on Network Log and SNMP", Journal of Digital Contents Society Vol. 18, No. 4, pp 747-751, Jul. 2017 https://doi.org/10.9728/DCS.2017.18.4.747
- ElasticSearch [Internet]. Available: https://www.elastic.co/kr/products/elasticsearch
- S. W. Son, K. S. Kim, J. W. Choi, and G. S. Lee, "Development of Managing Security Services System Protection Profile", Journal of Digital Contents Society Vol. 16, No. 2, pp 345-353, Apr. 2015 https://doi.org/10.9728/dcs.2015.16.2.345
- J. W. Yoon, C. Y. Park, and U. S. Song, "Building the Educational Practice System based on Open Source Cloud Computing", Journal of Digital Contents Society Vol. 14, No. 4, pp 505-511, Dec. 2013 https://doi.org/10.9728/dcs.2013.14.4.505
Cited by
- 네트워크 보안 관제를 위한 로그 시각화 방법 vol.7, pp.4, 2018, https://doi.org/10.30693/smj.2018.7.4.70
- 딥러닝을 활용한 마스크 착용 얼굴 체온 측정 시스템 vol.24, pp.2, 2021, https://doi.org/10.9717/kmms.2020.24.2.208
- 웹 모니터링 기반 암호화 웹트래픽 공격 탐지 시스템 vol.25, pp.3, 2018, https://doi.org/10.6109/jkiice.2021.25.3.449