Browse > Article
http://dx.doi.org/10.14400/JDC.2015.13.1.313

Context cognition technology through integrated cyber security context analysis  

Nam, Seung-Soo (Dept. of conversions Science, Konj-Ju National University)
Seo, Chang-Ho (Dept. of conversions Science, Konj-Ju National University)
Lee, Joo-Young (Network Security Research Team, ETRI)
Kim, Jong-Hyun (Network Security Research Team, ETRI)
Kim, Ik-Kyun (Network Security Research Team, ETRI)
Publication Information
Journal of Digital Convergence / v.13, no.1, 2015 , pp. 313-319 More about this Journal
Abstract
As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.
Keywords
DDos; Network Security; Cyber Security; Intrusion Prevention System; SIR;
Citations & Related Records
연도 인용수 순위
  • Reference
1 NIS, MSIP, KCC, MOSPA, KISA, NSRI, "2013 National Information Security White Paper," Apr. 2013.
2 Tankard, Colin. "Advanced Persistent threats and how to monitor and deter them" Network security, pp.16-19, 2011.
3 http://www.microsoft.com/ko-kr/security/default.aspx
4 http://www.igloosec.co.kr/
5 www.inzenss.com
6 M. O'neil, "Unix System in a Large Enterprise Environment - Axent ESM", SANS Institute Information Security Reading Room, 22 June 2001.
7 A. Sinha, A. Wang, and A. Chandrakasan, "Algorithmic Transforms for Efficient Energy Scalable Computation", Proc. of ISLPED, 2000.
8 K. Srinivasan, et al., iDedup: Latency-aware, inline data deduplication for primary storage, USENIX FAST 2012.