Browse > Article

Context cognition technology through integrated cyber security context analysis  

Nam, Seung-Soo (공주대학교 융합과학과)
Seo, Chang-Ho (공주대학교 융합과학과)
Lee, Joo-Young (한국전자통신연구원)
Kim, Jong-Hyun (한국전자통신연구원)
Kim, Ik-Kyun (한국전자통신연구원)
Publication Information
Smart Media Journal / v.4, no.4, 2015 , pp. 80-85 More about this Journal
Abstract
As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.
Keywords
DDos; Network Security; Cyber Security; Intrusion Prevention System; SIR;
Citations & Related Records
연도 인용수 순위
  • Reference
1 NIS, MSIP, KCC, MOSPA, KISA, NSRI, "2013 National Information Security White Paper" Apr, 2013.
2 Tankard, Colin, "Advanced Persistent threats and how to monitor and deter them" Network security, pp.16-19, 2011.
3 http://www.microsoft.com/ko-kr/security/default.aspx
4 http://www.igloosec.co.kr/
5 www.inzenss.com
6 M, O'neil, "Unix System in a Large Enterprise Environment - Axent ESM", SANS Institute Information Security Reading Room, 22 June 2001,
7 A. Sinha, A. Wang, and A. Chandrakasan, "Algorithmic Transforms for Efficient Energy Scalable Computation", Proc, of ISLPED, 2000,
8 K. Srinivasan, et al., iDedup: Latency-aware, inline data deduplication for primary storage, USENIX FAST 2012.