Browse > Article

A Designing Method of Digital Forensic Snort Application Model  

Noh, Si-Choon (남서울대학교 컴퓨터학과)
Publication Information
Abstract
Snort is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and approximately 300,000 registered users. Snort identifies network indicators by inspecting network packets in transmission. A process on a host's machine usually generates these network indicators. This means whatever the snort signature matches the packet, that same signature must be in memory for some period (possibly micro seconds) of time. Finally, investigate some security issues that you should consider when running a Snort system. Paper coverage includes: How an IDS Works, Where Snort fits, Snort system requirements, Exploring Snort's features, Using Snort on your network, Snort and your network architecture, security considerations with snort under digital forensic windows environment.
Keywords
Digital Forensic; Snort Application; Windows Environment;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Sichoon, Noh, "MSPI(Multi-Spectral Protection Infrastructure) System for Optimal Network Security", IEEE Computer Society, 2008.
2 Paul Woosnam, "10 hottest Technologies", Teleco mmunications, 2003.
3 박종성, 최운호, 문종섭, 손태식, "자동화된 침해사고 대응시스템에서의 네트웍 포렌식 정보에 대한 정의", 정보보호학회 논문지, 제14권, 제4호, pp. 149-162, 2004.   과학기술학회마을
4 정정기, 박대우, "로그 히스토리 분석을 사용한 웹 포렌식 알고리즘 연구", 한국 컴퓨터정보학회 논문지, 제12권 제1호, pp. 123-132, 2007.   과학기술학회마을
5 정익래, 홍도원, 정교일, "디지털 포렌식 기술 및 동향", 전자통신동향분석 제11권, 제1호, pp. 97-104, 2007.
6 이형우, 이상진, 임종인, "컴퓨터 포렌식스 기술", 한국정보보호학회지, 제12권, 제5호, pp. 8-16, 2002.   과학기술학회마을
7 Information Technology Laboratory-Computer Forensics Tool Testing Program, http:// www.cftt.nist.gov 2008.
8 Dieter Gollmann, "Computer Security", John Wiley and Sons, 2005.
9 고병수, 박영신, 최용락, "컴퓨터 포렌식스를 지원하는 보안 감사/추적 모듈설계", 한국 컴퓨터 정보학회 논문지, 제9권, 제1호, pp. 79-86, 2004.   과학기술학회마을