Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2004.11C.4.485

Design and Implementation of Linux-based Integrated Security System(LISS) Using Open Security Tools  

Jeon, Yong-Hee (대구가톨릭대학교 컴퓨터ㆍ정보통신공학부)
Kim, Min-Soo (경북직업전문학)
Jang, Jung-Sook (대구가톨릭대학교 컴퓨터ㆍ정보통신공학과)
Abstract
The wide spread of Internet makes susceptible to the attacks via communication Web from hackers using the vulnerability of both computer and network systems. In this paper, we design and implement an integrated security system, named as LISS(Linux-based Integrated Security System) in which an integrated security management is possible. This system is based on the open operating system, Linux and consists of open security tools, which is effective in security management of Linux based-servers. We also construct a test-bed in order to testify the performance of the LISS. It is revealed that the implemented system captures all the attack Patterns generated from Network Mapper.
Keywords
ESM(Enterprise Security System); Integrated Security System; Open Security Tool; Linux; Security Management;
Citations & Related Records
연도 인용수 순위
  • Reference
1 이윤성, 인터넷 해킹을 막기 위한 보안 방법 연구, 석사학위논문, 동아대학교, Dec., 2000
2 한국 교육 신문, 교육기관 해킹에 무방비, 사회면 기사, 2003. 9. 18
3 한국 침해사고 대응팀, 국내외 해킹현황, http://cc.or.kr/statistics/hack/hack.htm, July, 2003
4 박종오, '학내전산망의 안전성 확보를 위한 보안진단 에이전트 개발', 컴퓨터교육학회 논문지, 제4권 제3호, 2001
5 Market Trend, '보안 컨설팅 시장 조사', http://www.itdata.co.rk/column/200305/market/part3.asp, 시사컴퓨터, May, 2003
6 제2회 리눅스공동체세미나, 리눅스 침입 탐지 시스템(NIDS) 구축, Apr., 2001
7 Carl Endorf, Eugene Schultz, Jim Mellander, Intrusion Detection and Prevention, McGraw-Hill, 2004
8 John McHugh, 'Intrusion and intrusion detection,' IJIS(2001) 1,, pp.14-35, 2001   DOI   ScienceOn
9 M. Roesch, 'Snort-lightweight intrusion detection for networks,' Proc. of USENIX, pp.229-238, 1999
10 V. Jacobson, C. Leres, S. McCanne, libpcap, Lawrence Berkeley National Laboratory, http://www.-nrg.ee.lbl.gov, 1994
11 정병호, '정보화 환경에서 효율적인 전산 보안 시스템의 구축', 석사학위 논문, 전북대학교, Aug., 2001
12 Unix and Network Security, http://cbbrowne.com/info/secunix.html
13 KLDP, 'SSL Certificates HOWTO,' http://doc.kldp.org/wiki.php/DocbookSgml/SSL-Ceztificates-HOWTO, Mar., 2002
14 suid/guid tool, http://linux.cudeso.be/linuxdoc/sxid.php
15 http://www.openssl.org
16 반장호, 홍석범 역, 제러드무라니 저, 리눅스보안과 최적화 완벽 솔루션, 한빛미디어, 2002
17 Iptables Tutorial 1.1.19, http://iptables-tutorial.frozentux.net/iptables-tutorial.html
18 홍석범, 간단하면서도 막강한 파일 무결성 체크 프로그램, Fcheck, http://tt.co.kr/~antihong/Fcheck.doc, Jan., 2002
19 Fcheck, http://www.brandonhutchinson.com/fchek.html
20 Intrusion Detection Systems, Part IV : Logcheck, http://www.freeos.com/articles/3540/