Browse > Article
http://dx.doi.org/10.5392/JKCA.2010.10.8.084

Evaluation Items of ESM S/W by Case Analysis  

Kang, Deuk-Soo (호서대학교 벤처전문대학원 정보경영학과)
Yang, Hae-Sool (호서대학교 벤처전문대학원)
Publication Information
Abstract
ESM can do and wishes to investigate ESM software field base technology and investigate ESM software technology, market, standard and evaluation certification trend and develop evaluation model of ESM software that it becomes foundation to protect ESM software effectively that develop quality evaluation model of ESM software in this research by integration security administration system that gather fire wall, IDS, VPN etc. various kind of security solution by one. That is, because reflecting requirement of ESM software, develop evaluation module and proposed evaluation example along with method of exam.
Keywords
ESM; Evaluation Module; Evaluation Example;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 ISO/IEC 14598-1 : 1999, Information technology - Software product evaluation - Part 1: General overview.
2 ISO/IEC 14598-2 : 2000, Software engineering - Product evaluation - Part 2: Planning and management.
3 Ehab Al-Shaer and Hazem Gaqmed, "Discovery of Policy Anomalies in Distributed Firewalls" in Proc. of IEEE INFOCOMM' 04. Vol 23.
4 정연서, 류걸우, 장종수, “네트워크 보안을 위한 ESM 기술 동향”, 한국전자통신연구원, 주간기술 동향 통권 1026호, 2001(12).
5 이대식, 윤동식, 안희학, “ESM 시스템을 이용한 안정된 학내망 구축”, 정보보증논문지, 제 5권, 제 3호, 2005(9).
6 김성락, “통합 보안 관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구”, 한국 컴퓨터정보학회 논문지, 제12권, 제1호, 2007(3).
7 최대수, 이용균, “ESM에서 보안이벤트 분석기 술에 관한 연구”, 한국컴퓨터종합학술대회 논문집, Vol.34 No.1(D), 2007.
8 이경화, “능동형 통합보안관리 시스템 구조 설계”, 숭실대 정보과학대학원 석사논문, 2006(12).
9 ISO/IEC 9126, "Information Technology - Software Quality Characteris- tics and metrics - Part 1, 2, 3.
10 이영석, 나중찬, 손승원, ESM 개발동향:이기종 보 안 시스템 연도을 중심으로, IITA 기술정책정보단, 2003(5).
11 ISO/IEC 14598, "Information Technology - Software product evaluation - Part 1, 2, 3, 4, 5, 6.
12 Fan Chen and Ravi S, Sandhu. Constrainsts for Role-based Access control, George Mason University, 1996.
13 Mimicry Attacks on Host Based intrusion Detection System. David Wagner. Paolo Soto, 2003.