Browse > Article

Development of Traffic Centralized Control System Based on Protocol Redirection for DB Protection  

Su, Yang-Jin (소프트 캠프(주) 정보보안기술연구소)
Lee, Jae-Pil (소프트 캠프(주))
Park, Cheon-O ((주)피앤피씨큐어)
Lee, Deok-Gyu (ETRI 지식정보보호연구부)
Chang, Hang-Bae (대진대학교 경영학과)
Publication Information
Abstract
The technologies of domestic user programs are not enough to convert address convert information, which was collected via port redirection server, to user traffic. Generally traffic redirection technology is a special purpose technology for I/O traffic via network device. L4 switch needs various additional costs and devices to achieve this special purpose. To solve this problem, there appears need for a central management of control and monitoring by centralizing traffic at one position regardless of network structure and it is necessary to realize redirection function of switch at network layer. Therefore this study offer development of traffic central control system through protocol redirection of client-side.
Keywords
DB Protection; Data Leakage; Protocol Redirection; Traffic Control;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Sairam A.S. and Barua G., "Distributed route control schemes to load balance incoming traffic in multihomed stub networks," Communications(NCC), pp. 1-5, 2010
2 오승희, 남택용, 손승원, "네트워크 보안 동향," [IITA] 정보통신연구진흥원 학술정보.
3 오행석, 김정녀, 손승원, "차세대 네트워크 보안표준화," 대한전자공학회, 전자공학회논문지, 제43권, TC편 제7호, pp. 122-13, 2006.   과학기술학회마을
4 서정택, 윤주범, 임을규, 이철원, "네트워크 보안시뮬레이터에 관한 연구," 한국정보과학회, 한국정보과학회 2002년도 가을 학술발표논문집, 제29권, 제2호(I), pp. 475-477. 2002.
5 Bishop M. and Bailey D., "A Critical Analysis of Vulnerability Taxonomies," Technical Report CSE-96-11, Dept. of Computer Science, University of California at Davis, 1996.
6 Brian Marick, "A Survey of Software Fault Surveys," Technical Report UIUCDCS-R-90-1651, University of Illinois at Urbana-Champaign, 1990.
7 Eugene H. Spafford, "Common System Vulnerabilities," Proceedings of the Workshop on Future Directions in Computer Misuse and Anomaly Detection, 1992.
8 Howard JD. "An Analysis of Security Incidents on the Internet," Ph. D Thesis, Carnegie Mellon University, 1997.
9 Lee, Y. H. and Hwang, D. J., "Design and Implementation of Agent Based Dynamic Digital Rights Management," Journal of Information Processing Association, D. Vol.8D, No.5, pp.613-622, October 2001
10 Lai, D. and Zhongwei Zhang, "Improving Efficiency and Scalability of Service Network Graph by Re-routing Service Routes," Intelligent Information and Database Systems, pp. 414-419, 2009.