Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2017.7.1.035

Integrated Monitoring System using Log Data  

Jeon, Byung-Jin (Department of Information Security, Tongmyong University)
Yoon, Deok-Byeong (Department of Business, Tongmyong University)
Shin, Seung-Soo (Department of Information Security, Tongmyong University)
Publication Information
Journal of Convergence for Information Technology / v.7, no.1, 2017 , pp. 35-42 More about this Journal
Abstract
In this paper, we propose to implement an integrated monitoring system using log data to reduce the load of analysis task of information security officer and to detect information leak in advance. To do this, we developed a transmission module between different model DBMS that transmits large amount of log data generated by the individual security system (MSSQL) to the integrated monitoring system (ORACLE), and the transmitted log data is digitized by individual and individual and researches about the continuous inspection and measures against malicious users when the information leakage symptom is detected by using the numerical data.
Keywords
DBMS; Information leakage; Log Data; Security System;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 K. S. Yu, S. H. Im and H. B. KIM, "Technology trend and development direction of integrated log management system," Journal of the Korea Institute of Information Security & Cryptology, Vol. 23, No. 6, pp. 90-99, Dec. 2013.
2 D. H. Seo, J. M. Baek, M. K, Lee, M. Y. Yoon and D. S. Cho, "Secure Knowledge Management for Prevent illegal data leakage by Internal users," Journal of Internet Computing and Services, Vol. 11, No. 2, pp. 73-84, Apr. 2010.
3 G. H. Lee and C. G. Lee, "A Study on Building Leakage Prevention System using Analysis of Information Leakage Signs," Korea Institute Of Information Security And Cryptology, REVIEW OF KIISC, Vol. 19, No. 3, pp. 70-79, Jun. 2009.
4 J. H. Kim and H. J. Kim, "Prevention of information leakage and privacy violation," Korea Institute Of Information Security And Cryptology, REVIEW OF KIISC, Vol. 21, No. 5, pp. 45-49, Aug. 2011.
5 A. B. Garba, J. Armarego, D. Murray and W. Kenworthy, "Review of the information security and privacy challenges in BYOD environments," Journal of Information privacy and security, pp. 38-54, 2015.
6 D. S. Choi, G. J. Mun, Y. M. Kim and B. N. Noh, "An Analysis of Large-Scale Security Log using MapReduce," Journal of KIIT, Vol. 9, No. 8, pp. 125-132, Aug. 2011.
7 S. J. Park and J. I. Lim, "A study on the development of SRI(Security Risk Indicator)-based monitoring system to prevent the leakage of personally identifiable information," Journal of the Korea Institute of Information Security & Cryptology, pp. 637-644, Jun. 2012.
8 Y. H. Kim, E. N. Huh, "Personalized Analysis System for Enterprise Log Data Analysis," Korea Institute Of Information Security And Cryptology, Korea Institute Of Information Security And Cryptology, Vol. 23, No. 6, pp. 1149-1150, Jun. 2014.
9 J. Y. Lee and S. Y. Kang, "Design and Verification of the Integrated Log Analysis System for Enterprise Information Security," Journal of Digital Contents Society, Vol. 9, No. 3, pp. 491-498, Sept. 2008.
10 M. K. Baek and G. S. Lee, "A Study of Influence of Data Loss Prevention based on Contents", Department of Information and Communications Graduate School of Konkuk University, 2011.
11 D. S. Kim and S. R. Kim, "A Study on Monitoring Method about Information Leakage Sign using Application Log," Journal of Korean Institute of Information Technology, pp. 83-91, 2013
12 M. B. Hyun, S. J. Lee, "The Proactive Threat Protection Method from Predicting Resignation Throughout DRM Log Analysis and Monitor," Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 2, pp. 369-375, Apr. 2016.   DOI
13 H. S. Ahn, E. J. Yoon, K. D. Bu, I. G. Nam, "Secure and Efficient DB Security and Authentication Scheme for RFID System," Korea Institute Of Communication Sciences, The Journal of The Korean Institute of Communication Sciences, Vol. 36, No. 4, pp. 197-206, Apr. 2011.   DOI