• Title/Summary/Keyword: intrusion

Search Result 2,153, Processing Time 0.027 seconds

Intrusion Detection System using Pattern Classification with Hashing Technique (패턴분류와 해싱기법을 이용한 침입탐지 시스템)

  • 윤은준;김현성;부기동
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.75-82
    • /
    • 2003
  • Computer and network security has recently become a popular subject due to the explosive growth of the Internet Especially, attacks based on malformed packet are difficult to detect because these attacks use the skill of bypassing the intrusion detection system and Firewall. This paper designs and implements a network-based intrusion detection system (NIDS) which detects intrusions with malformed-packets in real-time. First, signatures, rules in NIDS like Snouts rule files, are classified using similar properties between signatures NIDS creates a rule tree applying hashing technique based on the classification. As a result the system can efficiently perform intrusion detection.

  • PDF

Rapid estimation of salinity in seawater intrusion zones and correlation analysis between resistivity and salinity (해수침투 지역의 염분농도 분포 파악 및 전기비저항의 상관성분석 사례)

  • Jung, Lae-Chul;Kim, Jung-Ho;Kim, Ki-Seog;Kim, Jong-Hoon;Ahn, Hee-Yoon
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.307-312
    • /
    • 2007
  • Seawater intrusion in estuarine regions is an important issue in protecting groundwater against salinity increase as well as in protecting construction materials against corrosion. For example, drain water ejected during accelerated consolidation for the improvement of soft ground can cause damages to farm land because the drain water from seawater intrusion zones contains salinity. In this study, we have employed correlation analysis between resistivity value and salinity of in situ pore water. The correlation analysis indicates that resistivity and salinity are in exponential relationship with good correlation. Therefore we suggest that rapid estimation of spatial distribution of NaCl is possible using resistivity data.

  • PDF

PUM: Processing Unit Module Design of Intrusion Detector for Large Scale Network (대규모 네트워크를 위한 침입 탐지결정모듈 설계)

  • 최인수;차홍준
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.2
    • /
    • pp.53-58
    • /
    • 2002
  • the popularity of uses for internet has been needed to information security. thereforce, intrusion, information leakage and modification, change or intentional efflux to computer system aspects of information security have been resulted in requirement of intrusion detection from outer at user authentication. this problem Presents design of PUM(Processing Unit Module) which analyze both the host log generated by sever host systems that various case for intellectualized intrusion method and network_packet on networks in large scale network.

  • PDF

A Network Intrusion Detection System Model for Detecting of Insertion and Evasion Attacks (삽입 및 배제 공격을 고려한 네트워크 침입 탐지 시스템 모델)

  • 차현철
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.4
    • /
    • pp.69-75
    • /
    • 2000
  • This paper proposes a network intrusion detection model which can detect the insertion and evasion attacks. These attacks can be prevented when some kind of information are available in the network intrusion detection system. We classified these information with three categories and used each category at setup phase and executing Phase. Within the proposed model, all necessary information which are related with networks and operating systems are maintained in the database and created as a table. This table is used during intrusion detection. The overheads of database and table may be simple in this model.

  • PDF

Design and Implementation of Intrusion Detection System of Packet Reduction Method (패킷 리덕션 방식의 침입탐지 시스템 설계 및 구현)

  • JUNG, Shin-Il;KIM, Bong-Je;KIM, Chang-Soo
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.17 no.2
    • /
    • pp.270-280
    • /
    • 2005
  • Many researchers have proposed the various methods to detect illegal intrusion in order to improve internet environment. Among these researches, IDS(Intrusion Detection System) is classified the most common model to protect network security. In this paper, we propose new log format instead of Apache log format for SSL integrity verification. We translate file-DB log format into R-DB log format. Using these methods we can manage Web server's integrity, and log data is transmitted verification system to be able to perform both primary function of IDS and Web server's integrity management at the same time. The proposed system in this paper is also able to use for wire and wireless environment based on PDA.

Kernel Level Intrusion Detection Technique for Network-based Intrusion Detection System (네트워크 기반 분산 침입탐지 시스템을 위한 커널 수준 침입탐지 기법)

  • Chung, Bo-Heung;Kim, Jeong-Nyeo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2173-2176
    • /
    • 2003
  • 본 논문에서는 네트워크 기반 분산 침입탐지 시스템을 위한 커널 수준 침입탐지 기법을 제안한다. 제안하는 기법은 탐지분석으로 침입탐지 과정을 분리하고 침입탐지 규칙 생성 요구에 대한 침입탐지 자료구조로의 변환을 사용자 응용 프로그램 수준에서 수행하며 생성된 자료구조의 포인터 연결을 커널 수준에서 수행한다. 침입탐지 규칙 변경은 노드를 삭제하지 않고 삭제표시만 수행하고 새로운 노드를 추가하는 삭제마크 띤 노드추가 방식 통하여 수행한다 제안하는 기법은 탐지과정의 분리를 통해 분산 네트워크 환경에 효율적으로 적용할 수 있으며 커널기반 침입탐지 방식을 사용하여 사용자 응용 프로그램으로 동작하는 에이전트기반의 침입탐지 기법에 비해 탐지속도가 빠르다. 침입탐지 규칙 변경은 삭제마크 및 노드추가 방식을 통해서 규칙변경과 침입탐지를 동시에 수행하기 위한 커널의 부하를 줄일 수 있다. 이를 통해 다양한 네트워크 공격에 대하여 신속하게 대응할 수 있다. 그러므로, 서비스거부 공격과 같이 네트워크 과부하가 발생하는 환경에서도 신속한 침입탐지와 탐지효율을 증가시킬 수 있다는 장점을 가진다.

  • PDF

A Scheme for Protecting Security Rules in Intrusion Detection System (침입 탐지 시스템을 위한 효율적인 룰 보호 기법)

  • 손재민;김현성;부기동
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.4
    • /
    • pp.8-16
    • /
    • 2003
  • This paper moses a method to solve the weakness in Snort, the network based intrusion detection system. Snort which is the rule-based intrusion detection system dose not supports a protection method for their own rules which are signatures to detect intrusions. Therefore the purpose of this paper is to provide a scheme for protecting rules. The system with the proposed scheme could support integrity and confidentiality to the rules.

  • PDF

Strength Analysis of Luggage Intrusion into Recreational Vehicle Seat (RV 차량 시트의 적재물 침입 강도해석)

  • Bae Jinwoo;Kang Sungjong
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.13 no.4
    • /
    • pp.160-166
    • /
    • 2005
  • In recent, recreational vehicles, which efficiently provide wide inner space for various utilities, are highly preferred in automobile market. Though those vehicles enable to load much luggage in space behind the last seat, in case of frontal impact with high velocity the luggage strongly collides into the seat back and the passengers in. the last seat could be severely injured. Therefore, high strength against luggage intrusion is required for the last seat, and it is regulated by law of ECE R17. In this study, for a recreational vehicle under developing, an analysis technique for simulating seat crash in accordance with luggage intrusion test of ECE R17 was investigated. The results exhibited good correlation with the test ones.

A Study on the Intrustion Tolerance System Applied To the Security System

  • Shin Seung-jung;Kim Jung-tae;Ryu Dae-hyun;Na Jong-Whoa
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.1
    • /
    • pp.38-42
    • /
    • 2005
  • The cyber attacks on the computer system in nowadays are focused on works that do not operate specific application. The main key point that we protect information security system has an access control to keep an application. Most of system has a main function to protect an infrastructure such as hardware, network and operating system. In this paper, we have presented an intrusion tolerance system that can service an application in spite of cyber attacks. The proposed system is based on the middle ware integrating security mechanism and separate function of application and intrusion tolerance. The main factor we use security system in nowadays is service to keep a persistency. The proposed intrusion tolerance system is applicable to such as medical, national defense and banking system.

A study of Intrusion Detection System applying for association rule agent (연관규칙 에이전트를 적용한 침입 탐지 시스템에 관한 연구)

  • 박찬호;정종근
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.5
    • /
    • pp.684-688
    • /
    • 2002
  • One of the Problems, which the Intrusion Detection System has, is a False Positive. This False make to low condition of the Intrusion Detection System. The cause of the False Positive is that the learning is not enough during audit data learning steps. Therefore, in this paper, 1 propose the method of the Intrusion Detection System that be learnt audit data to agent with association rule.