Browse > Article

A Study on the 3D-Puzzle Security Policy in Integrated Security System Network  

Seo, Woo-Seok (숭실대학교 일반대학원 컴퓨터학과)
Jun, Moon-Seog (숭실대학교 일반대학원 컴퓨터학과)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.5, no.4, 2010 , pp. 425-434 More about this Journal
Abstract
This study shows a limit to attacks that the prevention system, which is used as the mutual third aggressive packet path between open heterogeneous networks and applies prevention techniques according to the trace like IP tracking and attack methods, can prevent. Therefore, the study aims to learn information of constant attack routing protocol and of the path in network, the target of attack and build a database by encapsulating networks information routing protocol operates in order to prevent source attack paths. In addition, the study is conducted to divide network routing protocols developed from the process of dividing the various attack characters and prevent various attacks. This study is meaningful in that it analyzes attack path network and attacks of each routing protocol and secure exact mechanism for prevention by means of 3D-Puzzle, Path, and Cube of the integrated security system which is an implementation method of integrated information protection for access network defense.
Keywords
Path; Security; TCP/IP Layer;
Citations & Related Records
Times Cited By KSCI : 8  (Citation Analysis)
연도 인용수 순위
1 김창수, 정회경, "개방형 네트워크 보안시스템 구조,"한국해양정보통신학회논문지, 제 12권, 제4호, 643-650쪽, 2008년 1월.   과학기술학회마을
2 황기영, 주성원, "Network 基盤의 保安政策 管理모델 體系에 관한 硏究 : 迅速性, 保安强化 側面의 管理모델,"정보보호학회지, 제 18권, 제 3호, 109-117쪽, 2008년 6월.   과학기술학회마을
3 김철민, 강석인, 이성욱, 홍만표, "인터넷 웜 확산 억제를 위한 거시적 관점의 프레임워크,"정보과학회논문지, 제 15권, 제 9호, 675-684쪽, 2009년 9월.   과학기술학회마을
4 김영진, 권헌영, 임종인, "U-정보사회에서의 포괄적 네트워크 보안관리 방안,"정보보호학지, 제18권, 제 3호, 74-80쪽, 2008년 6월.   과학기술학회마을
5 이병건, 윤원식,"무선 Ad Hoc 네트워크을 위한 위치정보 기반 에너지 고려 라우팅 프로토콜," 전자공학회논문지, 제 45권, TC편, 제 7호, 62-66쪽, 2008년 7월.   과학기술학회마을
6 LI, Lin, LU, Xianliang,"Fast algorithm for detecting firewall filters conflicts,"Application research of computers , V. 25 No. 1, 266-267, 2008.
7 Liu, A.X, "Firewall policy verification and troubleshooting," Computer networks, V. 53 No. 16, 2800-2809, 2009.   DOI   ScienceOn
8 Xu, H, Ayachit, M, Reddyreddy, A, "Formal modelling and analysis of XML firewall for service-oriented systems," International journal of security and networks, V. 3 No. 4, 147-160, 2008.   DOI
9 천우성, 박대우, "DoS공격에 대한 N-IDS 탐지 및 패킷 분석 연구 DoS공격에 대한 N-IDS 탐지 및 패킷 분석 연구," 한국컴퓨터정보학회론문지, 제 13권, 제 6호, 217-224쪽, 2008년.   과학기술학회마을
10 신동진, 양해술, "유출트래픽 분석기반의 침입탐지시스템 설계 및 구현,"한국콘텐츠학회논문지, 제 9권, 제 4호, 131-141쪽, 2009년 4월.   과학기술학회마을
11 Cheng, F, Roschke, S, Meinel, C, "Implementing IDS Management on Lock-Keeper," Lecture notes in computer science, V. 5451, 360-371, 2009.
12 Xie, Y, Yu, F, Abadi, M, "De-anonymizing the Internet Using Unreliable IDs," SIGCOMM, 75-86, 2009.
13 Burns, Tom, Catty, Jocelyn, "IPS in Europe: the EQOLISE trial," Psychiatric rehabilitation journal, V. 31 No. 4, 313-317, 2008.   DOI   ScienceOn
14 Forte, D, "SSL VPN and return on investment: A possible combination," Network security, V. 2009 No. 10, 17-19, 2009.   DOI   ScienceOn
15 Trull, Timothy J, Ebner-Priemer, Ulrich W, "Using experience sampling methods/ecological momentary assessment (ESM/EMA) in clinical assessment and clinical research: introduction to the special section," Psychological assessment, V. 21 No. 4, 457-462, 2009.   DOI
16 Kleiven, S, Larsson, K, Kropp, W, "Time- Domain Modelling: Combining ESM and FDTD Methods for Acoustic Wave Propagation," Acta acustica united with Acustica, V. 95 No. 1, 118-127, 2009.   DOI   ScienceOn
17 이용균, "자동화.체계화.프로세스 개선으로 기업 보안관리 효율성 제고 : 복잡한 보안관리, ESM으로 해결...다양한 보안위협 대응하는 관리체계로 진화," Network times, No. 173, 136-137, 2008.
18 정치윤, 손선경, 장범환, 나중찬, "시각화 기반의 효율적인 네트워크 보안 상황 분석 방법,"정보보호학회논문지, 제 19권, 제 3호, 107-117쪽, 2009년 6월.   과학기술학회마을