Browse > Article

The framework to develop main criteria for a DDoS correspondence  

Lee, Yeon-Ho (숭실대학교 대학원 컴퓨터학과)
Kim, Beom-Jae (숭실대학교 대학원 컴퓨터학과)
Lee, Nam-Yong (숭실대학교 컴퓨터학부)
Kim, Jong-Bae ((주)이엔터프라이즈)
Publication Information
Journal of Digital Contents Society / v.11, no.1, 2010 , pp. 79-89 More about this Journal
Abstract
The government and companies build a DDoS correspondence system hastily to protect assets from cyber threats. It has become more and more intelligent and advanced such as DDoS attack. However, when outbreaks of the social incidents such as 7.7 DDoS attack(2009.7.7) or cases of the direct damage occurred, information security systems(ISS) only become the issue in the short term. As usual, sustained investment about ISS is a negative recognition. Since the characteristic of ISS is hard to recognize the effectiveness of them before incidents occurs. Also, results of incidents occurred classify attack and detection. Detailed and objective measurement criterion to measure effectiveness and efficiency of ISS is not existed. Recently, it is progress that evaluation and certification about for the information security management system(ISMS). Since these works propose only a general guideline, it is difficult to utilize as a result of ISMS improvement for organization. Therefore, this paper proposes a framework to develop main criteria by a correspondence strategy and process. It is able to detailed and objective measurements.
Keywords
DDoS; Information Security System; Correspondence Strategy; Framework;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Peng, T., Leckie, C., and Ramamohanarao, K., "Survey of Network-based Defense Mechanisms Countering the DoS and DDoS Problems", ACM Comput. Surv. 39, 1, Article 3, April 2007.
2 최양서, 오진태, 장종수, 류재철, "분산서비스거부(DDoS) 공격 통합 대응체계 연구", 정보보호학회논문지, 제19권 제5호, 2009.10.   과학기술학회마을
3 인터넷침해사고대응지원센터, "국내 주요 사이트 대상 분산서비스거부공격 분석보고서", 한국정보보호진흥원, 2009. 7.
4 구자현, "서비스 거부 공격(Denical of Service)의 유형 및 대응", 주간기술동향, 통권 1377호, 2008.12.
5 이희명, 임종인, "기업의 정보보호수준 측정모델 개발에 관한 연구", 한국정보보호학회논문지, 제18권 제5호, 2008.10.   과학기술학회마을
6 한국침해사고대응협의회, "All about DDoS 기술세미나", 2008
7 나윤지, 조영석, 고일석, "기업의 정보보호 수준 평가를 위한 평가지표", 정보.보안 논문지 제6권 제3호, 2006. 9.
8 유황빈, 김경탁, 윤창표, "해킹바이러스연구 최종보고서 - 서비스거부공격 위협분석 및 대응체계 연구", 한국정보보호센터, 2000. 12.
9 한국인터넷진흥원 ((구)한국정보보호진흥원), KISA, http://www.kisa.or.kr
10 Jelena Mirkovic, Peter Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms", ACM SIGCOMM Computer Communication Review, Volume 34, Issue 2, pp. 39-53, April 2004.   DOI   ScienceOn
11 SP800-53(Rev.2) : Recommended Security controls for Information Security, 2007. 10, NIST
12 ISO/IEC27001 : 2005(FDIS) Information Security Management System Requirements
13 BS7799 Part 1 "Information Security Management - Code of practice for information security management", BSI, 1999
14 BS7799 Part 2 "Information Security Management - Specification for information security management", BSI, 1999
15 ISO/IEC JTC1/SC7/WG1 "Guidelines for the Management of IT Security(GMITS) : Part 1 - Concepts and Model", 1997
16 ISO/IEC JTC1/SC7/WG1 "Guidelines for the Management of IT Security(GMITS) : Part 2 - Managing and Planning IT Security", 1998
17 ISO/IEC JTC1/SC7/WG1 "Guidelines for the Management of IT Security(GMITS) : Part 3 - Techniques for the Management of IT Security", 1998
18 ISO/IEC JTC1/SC7/WG1 "Guidelines for the Management of IT Security(GMITS) : Part 4 - Selection for Safeguard", 1999
19 Information Systems Audit and Control Association, "COBIT, Management Guideline, 3rd Edition", 2000
20 SP800-55(Rev.1) : Performance Measurement Guide for Information Security, 2008. 7, NIST
21 ISO/IEC27004(WD) : 2008(FDIS) Information security management measurements