• 제목/요약/키워드: intrusion

검색결과 2,132건 처리시간 0.034초

모바일 에드혹네트워크를 위한 효과적인 침입 탐지 시스템 (An Effective Intrusion Detection System for MobileAdHocNetwork)

  • ;박규진;박광채;최동유;한승조
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 춘계종합학술대회 A
    • /
    • pp.271-276
    • /
    • 2008
  • The intrusion detection system is one of the active fields of research in wireless networks. Intrusion detection in wireless mobile Ad hoc network is challenging because the network topologies is dynamic, lack centralization and are vulnerable to attacks. This paper is about the effective enhancement of the IDS technique that is being implemented in the mobile ad hoc network and deals with security and vulnerabilities issues which results in the better performance and detection of the intrusion.

  • PDF

도시철도 침입 탐지 상황인식 모델 정의 (Definition of Context-Awareness Model for Detection of Intrusion in Urban Transit)

  • 안태기;신정렬;김규진;정종덕
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2011년도 춘계학술대회 논문집
    • /
    • pp.1729-1734
    • /
    • 2011
  • Urban transit administers need to introduce the intelligent system to know the situations in the urban transit service area automatically. It is one of the important elements to detect of intrusion in operation room or electric rooms, etc. In this paper, we describe the definition for detection of intrusion in urban transit area, and propose the context-awareness model detect of intrusion. We expect that the definition is helpful to extract the elements that are need to construct the intrusion detecting system. The proposed model that is based on an image analysis model and a rule-based model is also helpful to design intelligent surveillance model.

  • PDF

A Study on the Intrusion Tolerance System Applied to the Object Oriented Middleware Environment

  • Shin Seung Jung;Kim Young Soo;Kim Jung Tae;Ryu Dae Hyun;Na Jong Whoa
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 학술대회지
    • /
    • pp.693-698
    • /
    • 2004
  • The cyber attacks on the computer system in nowadays are focused on works that do not operate specific application. The main key point that we protect information security system has an access control to keep an application. Most of system has a main function to protect an infrastructure such as hardware, network and operating system. In this paper, we have presented an intrusion tolerance system that can service an application in spite of cyber attacks. The proposed system is based on the middle ware integrating security mechanism and separate function of application and intrusion tolerance. The main factor we use security system in nowadays is service to keep a persistency. The proposed intrusion tolerance system is applicable to such as medical, national defense and banking system.

  • PDF

실시간 침입탐지 시스템에 관한 연구 (A Study on Realtime Intrusion Detection System)

  • 김병주
    • 한국정보통신학회논문지
    • /
    • 제9권1호
    • /
    • pp.40-44
    • /
    • 2005
  • 인공지능, 기계학습 및 데이터마이닝 기법들을 침입탐지 시스템에 적용하는 연구가 활발히 진행되고 있다. 그러나 많은 연구가 공격패턴의 분류를 위한 분류기(classifier)의 학습 알고리즘 성능 개선에 목적을 두고 있다. 그리고 이러한 학습 알고리즘은 대부분 일괄처리(batch) 방식으로 동작하여 실시간 침입탐지 시스템의 적용에는 적합하지 못하다. 본 논문에서는 실시간 침입탐지 시스템을 위한 점증적 특징 추출 기법과 분류가 가능한 실시간 침입탐지 시스템을 제안한다. 제안된 방법을 KDD CUP 99 자료에 적용한 결과 실시간 기법임에도 불구하고 일괄처리 방식과 비슷한 결과를 나타내었다.

A Novel Architecture for Real-time Automated Intrusion Detection Fingerprinting using Honeypot

  • Siddiqui, Muhammad Shoaib;Hong, Choong-Seon
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 춘계학술발표대회
    • /
    • pp.1093-1095
    • /
    • 2007
  • As the networking and data communication technology is making progress, there has been an augmented concern about the security. Intrusion Detection and Prevention Systems have long being providing a reliable layer in the field of Network Security. Intrusion Detection System works on analyzing the traffic and finding a known intrusion or attack pattern in that traffic. But as the new technology provides betterment for the world of the Internet; it also provides new and efficient ways for hacker to intrude in the system. Hence, these patterns on which IDS & IPS work need to be updated. For detecting the power and knowledge of attackers we sometimes make use of Honey-pots. In this paper, we propose a Honey-pot architecture that automatically updates the Intrusion's Signature Knowledge Base of the IDS in a Network.

  • PDF

Hybrid Neural Networks for Intrusion Detection System

  • Jirapummin, Chaivat;Kanthamanon, Prasert
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -2
    • /
    • pp.928-931
    • /
    • 2002
  • Network based intrusion detection system is a computer network security tool. In this paper, we present an intrusion detection system based on Self-Organizing Maps (SOM) and Resilient Propagation Neural Network (RPROP) for visualizing and classifying intrusion and normal patterns. We introduce a cluster matching equation for finding principal associated components in component planes. We apply data from The Third International Knowledge Discovery and Data Mining Tools Competition (KDD cup'99) for training and testing our prototype. From our experimental results with different network data, our scheme archives more than 90 percent detection rate, and less than 5 percent false alarm rate in one SYN flooding and two port scanning attack types.

  • PDF

패턴 분류를 이용한 침입탐지 시스템 모델 (An Intrusion Detection System Using Pattern Classification)

  • 윤은준;김현성;부기동
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2002년도 추계공동학술대회 정보환경 변화에 따른 신정보기술 패러다임
    • /
    • pp.59-65
    • /
    • 2002
  • 최근 침입 탐지 시스템에 대한 관심이 증대되고 있다. 침입 탐지 시스템에서 침입 여부 확인을 위하여 패턴매칭 기법이 주로 사용된다. 기존의 패턴매칭 기법들은 다양한 공격 패턴들에 대한 패턴 비교 시간이 많이 소요되는 문제점이 있었다. 본 논문에서는 기존의 패턴매 칭 기법들이 가지고 있는 문제점을 해결하기 위하여 새로운 침입 탐지 시스템을 제안한다. 제안한 시스템은 효율적인 패턴 비교를 위하여 룰 패턴을 분류한다. 분류된 패턴은 매칭을 위하여 정형화된 트리로 구현한다. 그러므로, 본 논문에서 제안한 침입 탐지 시스템 모델은 효율적으로 네트워크 침입 탐지를 수행할 수 있다.

  • PDF

A SURVEY ON INTRUSION DETECTION SYSTEMS IN COMPUTER NETWORKS

  • Zarringhalami, Zohreh;Rafsanjani, Marjan Kuchaki
    • Journal of applied mathematics & informatics
    • /
    • 제30권5_6호
    • /
    • pp.847-864
    • /
    • 2012
  • In recent years, using computer networks (wired and wireless networks) has been widespread in many applications. As computer networks become increasingly complex, the accompanied potential threats also grow to be more sophisticated and as such security has become one of the major concerns in them. Prevention methods alone are not sufficient to make them secure; therefore, detection should be added as another defense before an attacker can breach the system. Intrusion Detection Systems (IDSs) have become a key component in ensuring systems and networks security. An IDS monitors network activities in order to detect malicious actions performed by intruders and then initiate the appropriate countermeasures. In this paper, we present a survey and taxonomy of intrusion detection systems and then evaluate and compare them.

응급의료정보시스템의 보호를 위한 보안 구조 (Security Structure for Protection of Emergency Medical Information System)

  • 신상열;양환석
    • 디지털산업정보학회논문지
    • /
    • 제8권2호
    • /
    • pp.59-65
    • /
    • 2012
  • Emergency medical information center performs role of medical direction about disease consult and pre-hospital emergency handling scheme work to people. Emergency medical information system plays a major role to be decreased mortality and disability of emergency patient by providing information of medical institution especially when emergency patient has appeared. But, various attacks as a hacking have been happened in Emergency medical information system recently. In this paper, we proposed security structure which can protect the system securely by detecting attacks from outside effectively. Intrusion detection was performed using rule based detection technique according to protocol for every packet to detect attack and intrusion was reported to control center if intrusion was detected also. Intrusion detection was performed again using decision tree for packet which intrusion detection was not done. We experimented effectiveness using attacks as TCP-SYN, UDP flooding and ICMP flooding for proposed security structure in this paper.

패턴 분류를 이용한 침입탐지 시스템 모델 (An Intrusion Detection System Using Pattern Classification)

  • 윤은준;김현성;부기동
    • 한국산업정보학회:학술대회논문집
    • /
    • 한국산업정보학회 2002년도 추계공동학술대회
    • /
    • pp.59-65
    • /
    • 2002
  • 최근 침입 탐지시스템에 대한 관심이 증대되고 있다 침입탐지 시스템에서 침입여부 확인을 위하여 패턴매칭 기법이 주로 사용된다. 기존의 패턴매칭 기법들은 다양한 공격 패턴들에 대한 패턴 비교 시간이 많이 소요되는 문제점이 있었다. 본 논문에서는 기존의 패턴 매칭 기법들이 가지고 있는 문제점을 해결하기 위하여 새로운 침입 탐지 시스템을 제안한다. 제안한 시스템은 효율적인 패턴비교를 위하여 롤 패턴을 분류한다. 분류된 패턴은 매칭을 위하여 정형화된 트리로 구현한다 그러므로, 본 논문에서 제안한 침입탐지 시스템 모델은 효율적으로 네트워크 침입 탐지를 수행 할 수 있다.

  • PDF