• Title/Summary/Keyword: audit trail

Search Result 23, Processing Time 0.025 seconds

Implementation of Audit Trail Service System for EDI Security (EDI 보안 감사 추적 서비스 시스템 구현)

  • Jeong, Gyeong-Ja;Kim, Gi-Jung;Seo, Gyeong-Ran;Ryu, Geun-Ho;Gang, Chang-Gu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.3
    • /
    • pp.754-766
    • /
    • 1997
  • In this paper,we implement the Audit Trail Service Sydtem for the EDI Security.It has solved a law dispute between enterprises by informations that have generated by the EDI serice systrm.The audit trail service sys-tem implemented for EDI security satisfied the requirements of audit and the protocol of the security serive of X.435 and X.400.The EDI Security Audit System consists of the event discrimiator,the audit recirder,the audit archiver,and the provider of audit services .The event discriminator classified the reansmitted data from the EDI network ot audit sercices.The audit recorder constructs an index that has combined time information wiht audit unformations which are classified by the event discriminator.ZThe audit archiver performas the vacumming of added audit imformations by passing time by passing time.The audit provider is a module that carries out the audit trail servies by using stored audit informations. The audit provider suports audit servies,which are non-requdiation,proof and probe,controller of security,and accesing infrimation.The audit trail service system for EDI security constructs audit information by using index that is combining time imfromation,so it supports especially fast accesing audit information.

  • PDF

Design of Intrusion Detection and Audit Trail System using Network Events (전산망 사건을 이용한 침입 감지 및 감사 추적 시스템 설계)

  • Kim, Ki-Jung;Yun, Sang-Hun;Lee, Yong-Jun;Ryu, Keun-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.9
    • /
    • pp.2342-2353
    • /
    • 1997
  • According to the outstanding development of information industry, a study of firewall is progressing as one of methods to cope with threat and loss of the data through computer network. For the secure network, this paper proposes the method diminishing threat and loss of the network using the correlation firewall with network audit trail system. Also, this paper suggests not only the audit analyzer execution model but also the type of databases used in audit analyzer to analyze the audit data. Network audit trail system has the function of identifing and analyzing of all intruder actions using audit records created by users.

  • PDF

A Study on HVAC Parameter Monitoring System (Regarding Computer Validation) (HVAC 파라미터 모니터링 시스템에 대한 고찰 (Computer Validation 중심으로))

  • Kim, Jong-Gu
    • Proceedings of the SAREK Conference
    • /
    • 2008.06a
    • /
    • pp.90-95
    • /
    • 2008
  • This article presents practical advice regarding the implementation and management of an impeccable Building Management System. The BMS was introduced to the series of computerized systems including manufacturing, storage, distribution, and quality control. Recently revised GMP regulation is requesting an improvement in drug product quality regulatory system by computer system validation. Quality is critical to guarantee the efficacy and the safety of drugs and is approved in the evaluation process after the audit trail application. HVAC parameter monitoring system will record the identity of operators entering or confirming critical data. Authority to amend entered data should be restricted to nominated persons. Any alteration to an entry of critical data should be authorized in advance and recorded with the reason for the change.

  • PDF

Secure QoS Billing System Using Audit Trail Subsystem Design & Implementation (감사 추적 시스템 설계 및 구현을 통한 안전한 QoS 빌링 시스템)

  • Park, U-Chul;Kim, Jeong-Nyeo;Lee, Byeong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.597-606
    • /
    • 2001
  • In this paper, we propose the delay sensitive traffic and a high bandwidth QoS service in order to supply real-time traffic such as VoIP, multimedia service. We use IntServ over DiffServ network to supply end-to-end QoS service in the IETF. We define the proposed QoS services which are Best, Good, Default service. We analyze the performance using NS simulator with end to end QoS service in IntServ over DiffServ network. The proposed billing system uses the Accounting, Authentication, Authorization (AAA) functions of RADIUS protocol and proposes the dynamic pricing method according to network usage state using end-to-end QoS of IntServ over DiffServ network. In order to secure billing system, we design and implement audit trail system by the IEEE POSIX.1E standard.

  • PDF

Effects of Cognitive Styles and Navigation in HyperSpace Learning Environment (하이퍼스페이스 학습 환경에서의 인지 형태와 네비게이션의 교육 효과에 관한 연구)

  • Ahn, Mi-Lee
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3023-3032
    • /
    • 1997
  • This study examined individual differences in navigating in hyperspace learning environment where a minimum structure is provided. Using a hypercard stack called "Pearl Harbor", Field Dependent people used guidance more often than those in Field Indepedent; FI achieved scored higher at the end of the study; and FI people had some type of pattern showing from them audit trail when FD people did not show any trail of patterns. Also people with higher visual thinking scores achieved higher scores in hyperspace environment.

  • PDF

A Study on the Applications of Blockchain Transactions and Smart Contracts in Recordkeeping (블록체인 트랜잭션과 스마트 컨트랙트를 활용한 기록관리 적용 방안 연구)

  • Wang, Hosung;Moon, Shinhye;Han, Nungwoo
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.20 no.4
    • /
    • pp.81-105
    • /
    • 2020
  • This study examines the possibility of applying various recordkeeping methods through a platform built in 2019 by the National Archives of Korea. In particular, it aims to develop a way to track and store transactions using blockchain and to design and present the method of records management automation using smart contracts. In this regard, a literature review, a system analysis of CAMS and MAM, interviews with the experts, designing, implementation, and the development of the system's proof of concept were performed. These efforts resulted in the proposal of an archives and records management strategy utilizing blockchain, which guarantees transparency and accountability by preserving an audit trail on recordkeeping activities.

Aspects of Regulatory and Legal Implications on evoting

  • Kosmopoulos, Athanassios
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.311-331
    • /
    • 2004
  • This paper addresses the democracy-oriented regulatory and legal requirements that e-democracy impacts. It demonstrates that the structure of the political system also plays a significant role in the decision to develop an e-voting application. The short term perspective of the questions put before the electorate obliterate the long term perspective in which many policy problems have to be seen. A well-designed e-voting system should produce an audit trail that is even stronger than that of conventional systems (including paper-based systems). Remote Internet voting systems pose significant risk to the integrity of the voting process, and should not be fielded for use in public elections until substantial technical and social science issues are addressed. Conclusively the paper focuses on the specific attributes an electronic voting (polling place) system should respect and ensure such as transparency, verifiability, accountability, security and accuracy in relation to the constitutional requirements such as General, Free. Equal, Secret, Direct and Democratic.

  • PDF

Distributed Audit Retrieval and Trail System For Linux (리눅스 시스템에서의 분산 로그 검색 및 추적)

  • Park, Jun-Hyoung;Song, Choon-Hwan;Kim, Min-Soo;No, Bong-Nam
    • Annual Conference of KIPS
    • /
    • 2001.10b
    • /
    • pp.1053-1056
    • /
    • 2001
  • 시스템들은 시스템에서 발생한 일들에 대한 기록을 로그의 형식으로 남긴다. 이러한 로그들은 여러가지 목적으로 작성되어지며 이용되어진다. 그러나 로그 기록은 침입탐지뿐 아니라 여러 가지 목적을 가지고 이루어진다. 그러한 로그들 역시 침입 탐지에 사용한 수 있는 많은 정보가 있음에도 불구하고 사용되지 않고 버려지고 있음이 현실이다. 본 논문에서는 침입 탐지를 위하여 이러한 로그들을 적극적으로 이용함을 목적으로 한다. 또한 최근의 공격형태의 변화로 인해 하나의 시스템관점이 아닌 네트워크 관점에서의 탐지와 대응이 필요하게 되었다. 이를 위해 공격에 이용된 시스템들을 파악하고 그들의 정보를 이용한 수 있게 함으로써 상호 협력이 가능케 한다.

  • PDF

A Model of Audit Trail and Analysis System for the Detection of Intruders in Each Different Pattern (유형별 침입자 감지를 위한 감사추적 및 분석 시스템 모델)

  • Kim, Gi-Jung;Yun, Sang-Hun;Lee, Yong-Jun;Ryu, Geun-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.2
    • /
    • pp.198-210
    • /
    • 1999
  • 산업 및 통신기술이 급속히 발전함에 따라, 다양한 형태의 침입기법을 통해 클라이언트-서버 구조의 정보 공유 및 서비스 개념으로 운영되는 시스템상에서 중요한 정보에 대한 유출 및 파괴로 인한 역기능이 심각할 정도로 증가하고 있다. 따라서, 정보시스템에서의 정보의 불법유출을 방지하고 문서나 시스템에 대한 불법행위를 감지할 수 있는 감사추적 기법이 요구된다. 이 논문에서는 능동데이타베이스의 능동규칙을 기존 기법보다 효과적으로 침입자를 감지할수 있는 새로운 감사추적 및 분석시스템 모델을 제안하였다. 이 모델은 시스템사용자에 의해서 발생되는 감사자료의 비정상 여부를 판단할수 있는 기법과 유형별 침입자를 감지하는 알고리즘을 제시하여 정상적인 사용자의 이탈된 행동을 판단할 수 있는 바업을 제시한다.

Description of Computer System State for Intrusion Detection (침입 탐지를 위한 컴퓨터 시스템 상태 기술)

  • Kwak, Mi-Ra;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.147-149
    • /
    • 2006
  • We designed an intelligent intrusion detection scheme that works based on target system's operational states and doesn't depend on humans' analysis. As a prior work, we presents a scheme to describe computer system's operational states. For this, Hidden Markov Model is used. As input to modeling, huge amount of system audit trail including data on events occurred in target system connected to network and target system's resource usage monitoring data is used. We can predict system's future state based on current events' sequence using developed model and determine whether it would be in daniel or not.

  • PDF