Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.2.353

Study of Conversions Security Management System, Co-Relation Rule-Set scenario and architecture for incidence detection  

Hwang, Donguk (Deloitte Anjin LLC)
Lee, Sanghun (Deloitte Anjin LLC)
Abstract
We already have seen many studies and articles about the methodology responding the security risks and threats. But we still have some controversial subjects to be settled. Now, we are living in the era that we should focus on how to use the security systems instead of how to make it. In this point of view, a company need to find out the answer for these questions, which security risks have to be handled in a corporate, which system is better for responding the security threats, and how we can build necessary security architecture in case of developing systems. In this article, we'd like to study on-site scenarios threatening the corporate assets, the limit on dealing with these threats, and how to consolidate the security events and information from enormous assets. Also, we'd like to search for the direction form the actual cases which have shown the desired effect from converging the assets and network informations.
Keywords
Conversions Security Managment System(CSMS); ESM(Enterprise Security Management System); Co-Relation Rule-Set; Incident Detection Scenario; SIEM(Security Information and Event Management); Combined Aseet Management;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 YangHa-Chun, "Hacking Detection Mechanism of Cyber Attacks Modeling," The Journal of the Korean institute of electronic communication sciences v.8 no.9, pp.1313-1318, Jan. 2013   과학기술학회마을   DOI   ScienceOn
2 YongDal-Jung, "IT Security Guide for Enterprise v.6," HawSing Media, Seoul-Ganam-YeoksamDong, pp.39, Feb. 2011
3 Microsoft, "Querying nonSQL data stores with a SQL-style language", US-0039442, pp.1, Apr. 2012
4 TADAO MURATA, "Petri Nets:Properties, Analysis and Applications," Proceedings of the IEEE, Vol. 77, pp.541-580, APR. 1989   DOI   ScienceOn
5 Sangik-Lee, "A study on integrity of the gathering log data in network forensic," DDC : 005.8 22, Aug. 2009
6 DongHee-Lee, "A study on Improved Convergence Security Monitoring System model," Journal of information and security v.11 no.5, pp.3-12 , 1598-7329, Jan. 2011   과학기술학회마을
7 OkHyun-Ha, "A Study on Conversion Security Control System for Industrial Security," Journal of information and security v.9 no.4, pp.1-6, Dec. 2009   과학기술학회마을
8 ByongRae-Cha, "Normal Behavior Profiling based on Bayesian Network for Anomaly Intrusion Detection," Journal of the Korea society of computer and information v.8, no.1, pp.103-113, Mar. 2003   과학기술학회마을
9 DaeSun-Choi, "Risk analysis for Private information," Journal of information and security, v.23 no.3, pp.56-60, Jun. 2013