Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.5.969

A study on the security policy improvement using the big data  

Kim, Song-Young (Korea University, Graduate School of Information Security)
Kim, Joseph (Korea University, Graduate School of Information Security)
Lim, Jong-In (Korea University, Graduate School of Information Security)
Lee, Kyung-Ho (Korea University, Graduate School of Information Security)
Abstract
The information protection systems of company are intended to detect all weak points, intrusion, document drain. All actions of people in company are recorded and can check persistently. On the other hand, what analyze security log generated by these systems becomes more difficult. Most staff who manages the security systems, and analyze log is more incomprehensible than a user or a person of drain for an information distribution process of the work-site operations and the management procedure of the critical information. Such a reality say the serious nature of the internal information leakage that can be brought up more. While the research on the big data proceeds actively recently, the successful cases are being announced in the various areas. This research is going to present the improved big data processing technology and case of the security field.
Keywords
Big Data; Internal Information Leakage; Data Mining;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 산업기밀보호센터, http://service4.nis.go.kr /servlet/page?cmd=preservation&menu =AAA00
2 신혜원, "기업 내 정보유출방지를 위한 내부자 위험도 분석 방법론 연구," 한국컴퓨터종합학술대회 논문집, Vol39, No 1. pp. 295-297, 2012년 6월
3 이재용 외 1명, "기업정보 유출 방지를 위한 통합 로그분석 시스템 설계 및 검증," 디지털콘텐트학회 논문지 제 9권, pp. 491-498, 2008년 9월   과학기술학회마을
4 Tom White, "Hadoop: The Definitive Guide, Second Edition," OReilly Media , 2010
5 Ashish Thusoo외 8명, "Hive: a warehousing solution over a map-reduce framework," Proceedings of the VLDB Endowment VLDB Endowment Volume 2 Issue 2, pp. 1629-1629, August 2009
6 김종현 외 4명, "빅데이터를 활용한 사이버 보안 기술 동향," ETRI 사이버 보안 기술 특집, 제28권 제3호, pp. 19-29, 2013년 6월
7 이기혁 외 1명, "내부정보 유출 징후 분석을 통한 유출방지체계 구축에 관한 연구," 정보보호학회지, 제19권 제3호, pp. 70-79, 2009년 6월
8 S. Curry et al., "Big Data Fuels Intelligence- driven Security," RSA Security Brief, Jan. 2013.
9 Han, J. and Kamber, M., "Data Mining: Concepts and Techniques," Morgan Kaufmann, 2006.
10 박주영, "직원의 마음을 읽는 창, 빅데이터," SERI 경영노트, 제177호, 2013년 6월