• Title/Summary/Keyword: Audit Trail Analysis

Search Result 5, Processing Time 0.021 seconds

A Study on the Applications of Blockchain Transactions and Smart Contracts in Recordkeeping (블록체인 트랜잭션과 스마트 컨트랙트를 활용한 기록관리 적용 방안 연구)

  • Wang, Hosung;Moon, Shinhye;Han, Nungwoo
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.20 no.4
    • /
    • pp.81-105
    • /
    • 2020
  • This study examines the possibility of applying various recordkeeping methods through a platform built in 2019 by the National Archives of Korea. In particular, it aims to develop a way to track and store transactions using blockchain and to design and present the method of records management automation using smart contracts. In this regard, a literature review, a system analysis of CAMS and MAM, interviews with the experts, designing, implementation, and the development of the system's proof of concept were performed. These efforts resulted in the proposal of an archives and records management strategy utilizing blockchain, which guarantees transparency and accountability by preserving an audit trail on recordkeeping activities.

A Model of Audit Trail and Analysis System for the Detection of Intruders in Each Different Pattern (유형별 침입자 감지를 위한 감사추적 및 분석 시스템 모델)

  • Kim, Gi-Jung;Yun, Sang-Hun;Lee, Yong-Jun;Ryu, Geun-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.2
    • /
    • pp.198-210
    • /
    • 1999
  • 산업 및 통신기술이 급속히 발전함에 따라, 다양한 형태의 침입기법을 통해 클라이언트-서버 구조의 정보 공유 및 서비스 개념으로 운영되는 시스템상에서 중요한 정보에 대한 유출 및 파괴로 인한 역기능이 심각할 정도로 증가하고 있다. 따라서, 정보시스템에서의 정보의 불법유출을 방지하고 문서나 시스템에 대한 불법행위를 감지할 수 있는 감사추적 기법이 요구된다. 이 논문에서는 능동데이타베이스의 능동규칙을 기존 기법보다 효과적으로 침입자를 감지할수 있는 새로운 감사추적 및 분석시스템 모델을 제안하였다. 이 모델은 시스템사용자에 의해서 발생되는 감사자료의 비정상 여부를 판단할수 있는 기법과 유형별 침입자를 감지하는 알고리즘을 제시하여 정상적인 사용자의 이탈된 행동을 판단할 수 있는 바업을 제시한다.

Description of Computer System State for Intrusion Detection (침입 탐지를 위한 컴퓨터 시스템 상태 기술)

  • Kwak, Mi-Ra;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.147-149
    • /
    • 2006
  • We designed an intelligent intrusion detection scheme that works based on target system's operational states and doesn't depend on humans' analysis. As a prior work, we presents a scheme to describe computer system's operational states. For this, Hidden Markov Model is used. As input to modeling, huge amount of system audit trail including data on events occurred in target system connected to network and target system's resource usage monitoring data is used. We can predict system's future state based on current events' sequence using developed model and determine whether it would be in daniel or not.

  • PDF

Transaction Mining for Fraud Detection in ERP Systems

  • Khan, Roheena;Corney, Malcolm;Clark, Andrew;Mohay, George
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.2
    • /
    • pp.141-156
    • /
    • 2010
  • Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF