Browse > Article

Design and Implementation of Intrusion Detection System of Packet Reduction Method  

JUNG, Shin-Il (Pukyong National University)
KIM, Bong-Je (Pukyong National University)
KIM, Chang-Soo (Pukyong National University)
Publication Information
Journal of Fisheries and Marine Sciences Education / v.17, no.2, 2005 , pp. 270-280 More about this Journal
Abstract
Many researchers have proposed the various methods to detect illegal intrusion in order to improve internet environment. Among these researches, IDS(Intrusion Detection System) is classified the most common model to protect network security. In this paper, we propose new log format instead of Apache log format for SSL integrity verification. We translate file-DB log format into R-DB log format. Using these methods we can manage Web server's integrity, and log data is transmitted verification system to be able to perform both primary function of IDS and Web server's integrity management at the same time. The proposed system in this paper is also able to use for wire and wireless environment based on PDA.
Keywords
Intrusion Detection System; Integrity; Verification; SSL;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Stephen Northcutt, Judy Novak,'Network Intrusion Detection An Analyst's Handbook', Information Publish, 2001
2 이종후, 류재철 '인터넷 보안', Telecommunication Review, 제 10권 5호, 2000
3 김창수, '네트워크 기반의 침입탐지 시스템', 부경대학교 연구보고서, 2002. 6
4 J.Viega, M. Messier, P. Chandra, 'Network Security with OpenSSL', O'REILLY, 2002. 6
5 Wagner,D. and Scheneier,B. , 'Analysis of the SSL 3.0 Protocol', 2nd USENIX Workshop on Electronic Commerce Proceedings, 1996
6 이영무, '최강 MySQL 바이블', 가메출판사, 2003. 3
7 한국정보보호진흥원 '3월 해킹바이러스 통계 및 분석 월보' 2004. 3
8 Horie, T., Harada, T., Tanaka, K., 'Adaptive Access Policy for the Linux Kernel', Applications and the Internet Proceedings. pp.82-88, 2005. 1
9 George Reese, Randy Jay Yarger, Tim King, 'Managing & Using MySQL, 2nd Edition', O'Reilly, 2002. 4
10 정관진, '아파치 로그파일의 이해와 분석', http://www.apache.kr.net/documents/log_storyII.html
11 R Magnus, U Kunitz, M Dziadzka, DVerworner, M Beck, H Bohme 'Linux Kernel Internals' pp.258-315, 1999
12 Eric Rescorla 'SSL and TLS', Addison- Wesley Press, 2001