Browse > Article
http://dx.doi.org/10.3745/KTCCS.2015.4.2.65

Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario  

Park, Jang-Su (순천향대학교 컴퓨터학과)
Lee, Im-Yeong (순천향대학교 컴퓨터소프트웨어공학과)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.4, no.2, 2015 , pp. 65-72 More about this Journal
Abstract
According to recent statistics published by the National Industrial Security Center, former and current employees are responsible for 80.4% of companies' technology leakages, and employees of cooperative firms are responsible for another 9.6%. This means that 90% of technology leakages are intentionally or mistakenly caused by insiders. In a recent incident, a credit card company leaked private information, and the person responsible was an employee of a cooperative firm. These types of incidents have an adverse effect not only on a company's assets but also on its reputation. Therefore, most institutions implement various security solutions to prevent information from being leaked. However, security solutions are difficult to analyze and distinguish from one another because their logs are independently operated and managed. A large number of logs are created from various security solutions. This thesis investigates how to prevent internal data leakage by setting up individual scenarios for each security solution, analyzing each scenario's logs, and applying a monitoring system to each scenario.
Keywords
Data Loss/Leakage Prevention; Scenario of Internal Data Leakage;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 National Industrial Security Center, http://service12.nis.go.kr
2 Privacy Information Protection Portal, http://www.privacy.go.kr
3 Jung-Ho Eom, Seon-Ho Park, and Tai M. Chung, "An Architecture of Access Control Model for Preventing Illegal Information Leakage by Insider," Journal of The Korea Institute of Information Security and Cryptology, Vol.20, No.1, pp.59-67, 2010.
4 Dae-Sung Lee, Jason Kim, and Kui-Nam Kim, "Research and Technology Trends for Prevention of Data Leakage," Review of The Korea Institute of Information Security and Cryptology, Vol.20, No.1, pp.56-65, 2010.
5 Hang-Bae Chang, "The Design of Information Security Management System for SMEs Industry Technique Leakage Prevention," Journal of Korea Multimedia Society, Vol.13, No.1, pp.111-121, 2010.
6 Ji-Hoon Song, Si-Jin Lee, "A Study of Information Security Measures Requirements Analysis Considering Insider Threats," Proceedings of the conference on Korean Society for Internet Information, pp.399-404, 2010.
7 Song-Young Kim, Joseph Kim, Jong-In Lim, and Kyung-Ho Lee, "A study on the security policy improvement using the big data," Journal of The Korea Institute of Information Security and Cryptology, Vol.23, No.5, pp.969-976, 2013.   DOI
8 Jang-Su Park, Jung-Hyun Park, Yong-Suk Kang, and Im-Yeong Lee, "A study on Scenario Design Methodology for Prevention of Information Leak by Using Modeling of User Behavior," Proceedings of the conference on Korea Information Processing Society, Vol.20, No.1, 2013.
9 Jang-Su Park, Yong-Suk Kang, and Im-Yeong Lee, "A Study on The Management Plan for Prevention of Information Leak by Using Call-out," Proceedings of the conference on Korea Information Processing Society, Vol.21, No.1, 2014.
10 Jang-Su Park, Im-Yeong Lee, "A Study on Log Analysis Plan for Prevention of Information Leak Security Solution - focusing at a Single Scenario for Information Leak," Proceedings of the Korea Institute of Information Security and Cryptology Chungnam Conference, 2014.