DOI QR코드

DOI QR Code

A Designing Method of Performance Evaluation for Network Security Equipment of Korean Style

한국형 네트워크 보안 시스템 성능 평가 방법론 실계

  • 주승환 (한국기술교육대학교 컴퓨터공학과) ;
  • 서희석 (한국기술교육대학교 컴퓨터정보공학부) ;
  • 김상연 (한국기술교육대학교 컴퓨터공학부)
  • Received : 2011.08.25
  • Accepted : 2011.09.10
  • Published : 2011.09.30

Abstract

With the advancement of network, privacy information as well as confidential information that belongs to government and company are exposed to security incident like spreading viruses or DDoS attack. To prevent these security incident and protect information that belongs to government and company, Security system has developed such as antivirus, firewall, IPS, VPN, and other network security system. Network security systems should be selected based on purpose, usage and cost. Verification for network security product's basic features performed in a variety of ways at home and abroad, but consumers who buy these network security product, just rely on the information presented at companies. Therefore, common user doing self performance evaluation for perform Verification before buying network security product but these verification depends on inaccurate data which based on some user's criteria. On this paper, we designing methodology of network security system performance evaluation focused on Korean using other cases of performance evaluation.

Keywords

References

  1. 정지환, 김상영, 황선명, "네트워크 보안성능 및 보안성 평가 방법에 관한 연구," 한국멀티미디어학회, 2003년도 추계 학술발표논문집 2003.
  2. NIST FIPS 199, "Standards for Security Categorization of Federal Information and Information Systems," 2004.
  3. NIST FIPS 200, "Minimum Security Requirements for Federal Informationand Information Systems," 2006.
  4. ISTF-003, "IP 계층에서의 VPN 보안기술 표준" 한국정보통신기술협회, 2001
  5. ISTF-004, "침입차단시스템 로그형식 표준", 한국정보통신기술협회, 2001
  6. TTAS. KO-12.004, "네트워크 보안 장비에 대한 성능 측정 방법," 한국정보통신기술협회, 2006
  7. Tolly Group, http://tolly.com., 2011.
  8. ICSA Labs, http://www.icsalabs.com, 2011.
  9. VeriTest, http://lionbridge.com, 2011.
  10. NSS Labs, http://www.nss.co.uk, 2011.
  11. 허수만, 서희석, "계약망 프로토콜과 DEVS 모델링을 통한 센서네트워크 보안 모델의 설계," 디지털산업정보학회 논문지, 4권, 4호, pp. 41-49, 2008.
  12. 이기성, 김태경, 서희석, "DEVS 모델링을 이용한 보안제품 공동평가 통계," 디지털산업정보학회 논문지, 6권, 2호, pp. 71-80, 2010.