Browse > Article
http://dx.doi.org/10.13089/JKIISC.2012.22.4.797

Decision Support System to Detect Unauthorized Access in Smart Work Environment  

Lee, Jae-Ho (Graduate School of Information Security, Korea University)
Lee, Dong-Hoon (Graduate School of Information Security, Korea University)
Kim, Huy-Kang (Graduate School of Information Security, Korea University)
Abstract
In smart work environment, a company provides employees a flexible work environment for tele-working using mobile phone or portable devices. On the other hand, such environment are exposed to the risks which the attacker can intrude into computer systems or leak personal information of smart-workers' and gain a company's sensitive information. To reduce these risks, the security administrator needs to analyze the usage patterns of employees and detect abnormal behaviors by monitoring VPN(Virtual Private Network) access log. This paper proposes a decision support system that can notify the status by using visualization and similarity measure through clustering analysis. On average, 88.7% of abnormal event can be detected by this proposed method. With this proposed system, the security administrator can detect abnormal behaviors of the employees and prevent account theft.
Keywords
smart work; unauthorized access; decision support system; visualization; clustering;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 "기업을 위한 스마트워크 도입, 운영 가이드북", 방송통신위원회 한국정보화진흥원, pp. 07-13, Oct. 2010
2 이형찬, 이정현, 손기욱, "스마트워크 보안 위협과 대책", 정보보호학회지, 21(3), pp. 12-21, 2011년
3 오병근, 강성중, 정보 디자인 교과서, pp. 99-123 2008년
4 Y.Livnat, J.Agutter, S.Moon, F. Erbacher, S.Foresti, "A Visualization Paradigm for Network Intrusion Detection", Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, pp. 92-99, June. 2005
5 H.Choi and H.Lee, PCAV: Internet Attack Visualization on Parallel Coordinates, vol. 3783, ICICS 2005, pp. 454-466, 2005.
6 R.Xu, "Survey of Clustering Algorithms", IEEE Transantions On Neural Networks, vol. 16, no. 3, pp. 645-678, May 2005
7 J.Han and M.Kamber, Data Mining: Concepts and Techniques, Morgan Kaufmann, 2000
8 오일석, 패턴인식, 교보문고, 2008
9 W.Lee and S.J. Stolfo, "Data Mining Approaches for Intrusion Detection", 7th USENIX Security Symposium, pp. 79-94, Apr. 1998
10 Y.Guan, A. Ghorbani, "Y-means : A Clustering Method For Intrusion Detection", Canadian Conference on Electrical and Computer Engineering, pp. 1-4, May 2003
11 V.J.Hodge, J.Austin, "A Survey of Outlier Detection Methodologies", Artificial Intelligence Review, vol. 22, no. 2, pp. 85-126, Nov. 2004   DOI
12 OpenVPN, http://openvpn.net
13 박동련, "R에 의한 통계그래픽스 : 강의 내용 및 방법의 논의", 응용통계연구 20(3), pp. 619-634, 2007년
14 P.J. ROUSSEEUW, Silhouettes: a graphical aid to the interpretation and validation of cluster analysis, Journal of Computational and Applied Mathematics, vol. 20, pp.53-65, Nov. 1987   DOI
15 M.Schonlau, W.Dumouchel, W.Ju, "Computer Intrusion:Detecting Masquerades", Statistical Science, vol. 16, no. 1, pp. 58-74, Feb. 2001   DOI   ScienceOn