Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2017.7.1.025

Improved Integrated Monitoring System Design and Construction  

Jeon, Byung-Jin (Department of Information Security, Tongmyong University)
Yoon, Deok-Byeong (Department of Business, Tongmyong University)
Shin, Seung-Soo (Department of Information Security, Tongmyong University)
Publication Information
Journal of Convergence for Information Technology / v.7, no.1, 2017 , pp. 25-33 More about this Journal
Abstract
In order to prevent information leakage, companies are monitoring the information leakage by internal staff by building individual security system and integrated monitoring system of firewall and DLP function. Especially, many log data of the integrated monitoring system cause time and money, and it is difficult to detect information leak of fast malicious personnel due to system slowdown. It is necessary to speed up the system by digitizing large log data for each day and person for fast information leakage detection and there is a need to develop and manage a continuous monitoring program for the information leakage indications personnel. Therefore, we propose an improved integrated monitoring system using log data by date and individual data.
Keywords
Information leakage; DLP; Integrated monitoring; Log Data;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 Y. H. Kim and E. N. Huh, "Log Analysis Supporting System based on Log Data for Efficient Big Data Analysis," KOREA INFORMATION SCIENCE SOCIETY, Journal of the Korea information science society, pp. 936-938, Dec. 2014.
2 J. H. Kim, J. I. Lim and H. K. Kim, "Collaborative security response by interworking between multiple security solutions," Korea Institute Of Information Security And Cryptology, Journal of the Korea Institute of Information Security & Cryptology, Vol. 23, NO. 1, pp. 69-79, Fev. 2013.   DOI
3 K. M. Ahn, J. Y. Lee, D. M. Yang and B. H. Lee, "Design and Implementation of a Hadoop-based Efficient Security Log Analysis System," Journal of the Korea Institute of Information and Communication Engineering, Vol. 19, No. 8, pp. 1797-1804, Aug. 2015.   DOI
4 J. H. Kim and H. J. Kim, "Prevention of information leakage and privacy violation," Korea Institute Of Information Security And Cryptology, REVIEW OF KIISC, Vol. 21, No. 5, pp. 45-49, Aug. 2011.
5 A. B. Garba, J. Armarego, D. Murray and W. Kenworthy, "Review of the information security and privacy challenges in BYOD environments," Journal of Information privacy and security, pp. 38-54, 2015.
6 M. S. Kim and D. W. Kang, "Information leakage prevention system design for small business," Feb. 2008.
7 D. S. Kim and S. R. Kim, "A Study on Monitoring Method about Information Leakage Sign using Application Log," Journal of Korean Institute of Information Technology, pp. 83-91, 2013
8 J. Y. Lee and S. Y. Kang, "Design and Verification of the Integrated Log Analysis System for Enterprise Information Security," Journal of Digital Contents Society, Vol. 9 No. 3, pp. 491-498, Sept. 2008.
9 K. S. Yu, S. H. Im and H. B. KIM, "Technology trend and development direction of integrated log management system," Korea Institute Of Information Security And Cryptology, Korea Institute Of Information Security And Cryptology, Vol. 23, No. 6, pp. 90-99, Dec. 2013.
10 S. J. Park and J. I. Lim, "A study on the development of SRI(Security Risk Indicator)-based monitoring system to prevent the leakage of personally identifiable information," Korea Institute Of Information Security And Cryptology, Journal of the Korea Institute of Information Security & Cryptology, pp. 637-644, Jun. 2012.
11 M. B. Hyun and S. J. Lee, "The Proactive Threat Protection Method from Predicting Resignation Throughout DRM Log Analysis and Monitor," Korea Institute Of Information Security And Cryptology, Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 2, pp. 369-375, Apr. 2016.   DOI
12 Y. H. Kim and E. N. Huh, "Personalized Analysis System for Enterprise Log Data Analysis," Korea Institute Of Information Security And Cryptology, Journal of the Korea Institute of Information Security & Cryptology, Vol. 23, No. 6, pp. 1149-1150, Jun. 2014.
13 S. H. Yoon, "Study on the Technical Security Factor for the Implementation of Secure DB System," The Korean Society Of Computer And Information, Journal of the Korea Society of Computer and Information, Vol. 19, No. 12, pp. 143-152, Dec. 2014.   DOI
14 C. J. Ryu, M. H. Han and S. J. Han, "Design of Log Management System based on Document Database for Big Data Management," The Korea Institute of Information and Communication Engineering, Journal of the Korea Institute of Information and Communication Engineering, Vol. 19, No. 11, pp. 2629-2636, Nov. 2015.   DOI