Browse > Article

Development Security agents for Integrated security management of the Educational Network  

Lee, Do Hyeon ((주)유아이넷/연구소)
Kim, Hyun Cheol (남서울대학교/컴퓨터학과)
Kim, Jeom Goo (남서울대학교/컴퓨터학과)
Publication Information
Abstract
Security infrastructure of Educational Network responds to threats by collecting and analyzing security events from various information protection system based on the integrated management system. Even if this system provides useful and detailed information to the administrator, there are some problems that this system does not provide effective response process and management systems for various threatening situations and the simultaneous threat processes. To solve this problem, we propose and develop security agents that enable the administrator to effectively manage integrated security for Educational Network. The proposed solution provides the administrator with efficient management techniques and process scheduling for various security events so that the administrator can response promptly to problems with the initial threat to Educational Network.
Keywords
ESM; Security Event; Security Management; Educational Network; Threat;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 이동영, 김동수, 정태명, "이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구", 한국정보처리학회논문지C, 8C(5) 2001.
2 박준홍, 남길현 "대규모 조직에 적합한 계층적 구조의 통합 보안관리 시스템에 관한 연구" 한국정보보호학회지 학술대회지, 2001.
3 손우용, 송정길 "통합보안 관리시스템의 침입탐지 및 대응을 위한 보안 정책 모델" 한국컴퓨터정보학회논문지, 9(5) 2004.
4 이영석, 능동 네트워크 기반의 능동 보안 관리 시스템 한국통신학회논문지, 29(4C) pp559-569, 2004.
5 Deron Powell, "Enterprise Security Management (ESM) : Centralizing Management of Your Security Policy" SANS Institute, December 2010
6 Randy Heffner, "Enterprise Application Security Integration", IT Trends 2012, December 2011
7 Michael O'neill, "Unix System in a Large Enterprise Environment - Axent ESM", SANS Institute Information security Reading Room, 22 June 2013.
8 Youngsup Kim , Seung Yub Baek, Geuk Lee(2005) "Intelligent Tool For Enterprise Vulnerability Assessment On Distributed Network Environment using Nessus And OVAL" LNAI3682 pp1056-1061,
9 Minar N, Gray M, Poop o, Krikorian R, Maes p(2000), "Hive Distributed agents for networking things",IEEE Consurrency, Volume8 pp.24-23 ,   DOI
10 Filman R.,Linden T(2004.).,"Communicating security agents",proceedings of the 5th Workshop, pp.664-671,
11 Distributed scan model for Enterprise-Wide network Vulnerability Assessment, http://www.sans.org/rr/paper/5/74.pdf
12 Erik Kamerling, Three Questions for the October8, 2003 top 20 Briefings, http://www.sans.org/top20/overview03.pdf
13 Eduardo B. Fernandez, An overview of Internet security, http://www.antibozo.net/ogata/security/overview/,1998
14 Introduction of OVAL, http://oval.mitre.org/documents/docs-03/intro/intr o.doc
15 Introduction of CVE, The Key to information sharing, http://cve.mite.org/doc/docs2000/ky_to_inffo_shar.pdf