Browse > Article
http://dx.doi.org/10.5573/ieie.2015.52.11.164

Design and Implimentation of Intrusion Detection System on Contents Security  

Kim, Young Sun (Dept. of Tax & Accounting, Daelim University)
Seo, Choon Weon (Dept. of Computer Network, Kimpo University)
Publication Information
Journal of the Institute of Electronics and Information Engineers / v.52, no.11, 2015 , pp. 164-168 More about this Journal
Abstract
As Internet use is widespread advertising through the Web, shopping, banking, etc. As the various services offered by the network, the need for Web security is increasing. A security system for the protection of information assets and systems against various types of external hacking threats and unlawful intrusion will require. Intrusion Detection Tool of the paper web will have is to increase the security level, to prevent the loss of resources and labor spent by the individual monitoring of the web. Security intrusion detection system analyzes the cause of the problem of the security vulnerability and exposure of the information on the Web. Using a monitor to determine a fast support of security is to design a security system for the purpose of protecting the information security vulnerability and exposure information.
Keywords
Contents; Security; Intrusion Detection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Garfinkel, G. Spafford, Practical UNIX and Interent Security, 2nd Ed. Oreilly & Associates Inc., pp.731-757, 2002. 11.
2 Hyundong Lee and Mokdong Chun, "Context-Aware Security System for Cloud Computing Environment", joural of the Institute of Electronics and Information Enginerrs, Vol.47 CI. pp.19-27. November 2010.
3 Moon-Goo Lee, "Secured Verification of Intrusion Prevention System Security Model Based on CPNs", joural of the Institute of Electronics and Information Enginerrs, Vol.48 CI. pp.76-81. May 2011.
4 Sunghee Woo, "A Study on Security Capability of IDPS", joural of the Institute of Electronics and Information Enginerrs, Vol.49 CI. pp.9-11. July 2012.   DOI   ScienceOn
5 H. Jang and S. Kim, "A Self-Extension Monitoring for Security Management," Proceeding of the 16th Annual Computer Security Applications Conference, pp.196-203, December 2000.