Browse > Article

On the Configuration and Improvement of Security Control Systems  

Yoo, Seung Jae (중부대학교 정보보호학과)
Publication Information
Abstract
Due to the advanced IT environment, the role of Security Monitoring & Control becomes more important as the cyber-crime is becoming intelligent, diversified, and advanced. In contrast to the way it relied solely on security devices such as Firewall and IDS in the past, Security Monitoring & Control tasks responding to cyber attacks through real-time monitoring have become wide spread and their role is also important. In response to current cyber threats, since security equipment alone can not be guaranteed a stable defense, the task of Security Monitoring & Control became essential to operate and monitor security equipment and to respond in real time. In this study, we will discuss how to configure network security system effectively and how to improve the real-time Security Monitor & Control.
Keywords
Security Monitoring & Control System; Behavior-based Detection; Security Countermeasure;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Park, Si-Jang; Park, Jong-Hoon, "Current Status and Analysis of Domestic Security Monitoring Systems", The Journal of the Korea institute of electronic communication sciences, Volume 9, Issue 2, 2014, pp.261-266   DOI
2 Eric Cole, Ronald L. Krutz and James Conley, Network Security Bible, John Wiley & Sons Inc., 2005
3 John R. Vacca, Computer and Information Security Handbook, Elsevier, 2013
4 Michael E Whiteman and Herbert J. Mattord, Principle of Information Security, Thomson, 2003.
5 Paul Campbell, Ben Calvert, Steven Boswell, Security+Guide to Network Security, Thomson, 2003.
6 Next Generation Behavior-based Threat Detection, http://blog.lgcns.com/1221
7 McAfee Labs Threat s Report, 2014
8 곽희선, "진화하는 APT 공격에 대응한 보안관제의 진화 방안", IDG Summary, 2015
9 김귀남 외1명, "데이터 마이닝 기반 보안관제 시스템", 정보보안논문지 제11권 6호, 3-8, 2011.
10 신휴근, 김기철, "보안관제 기술동향 조사 및 차세대 보안관제 프레임워크 연구", 정보보호학회지 제23권 제6호, 2013.
11 이동휘, 하옥현 "융합보안관제시스템 개선에 관한 연구", 융합보안논문지 제11권 제5호 pp.3-12, 2011