DOI QR코드

DOI QR Code

Current Status and Analysis of Domestic Security Monitoring Systems

국내 보안관제 체계의 현황 및 분석

  • 박시장 (KT전남고객본부 SMB컨설팅센터) ;
  • 박종훈 (중부대학교 컴퓨터학과)
  • Received : 2013.11.13
  • Accepted : 2014.02.11
  • Published : 2014.02.28

Abstract

The current status of domestic monitoring centers was reviewed and the pattern-based security monitoring system and the centralized security monitoring system, both of which are the characteristics of security monitoring systems, were analyzed together with their advantages and disadvantages. In addition, as for a development plan of domestic security monitoring systems, in order to improve the problems of the existing pattern-based centralized monitoring system, Honeynet and Darknet, which are based on anomalous behavior detection, were analyzed and their application plans were described.

국내 보안관제센터들의 현황을 검토하였으며, 보안관제 체계의 특징인 패턴기반 보안관제체계와 중앙집중형 보안관제 체계에 대한 분석과 장단점을 분석하였다. 또한 국내 보안관제 체계 발전방안에서는 기존 패턴 기반의 중앙집중형 관제 체계가 가지고 있는 문제점을 개선하기 위해 이상행위 탐지기반의 허니넷과 다크넷을 분석하여 이를 적용한 발전 방안을 기술하였다.

Keywords

References

  1. T. Nam, S. Kim, S. Lee, J. Ji, and S. Son, "Reliable Next Generation Network Security System," Korea Information Protection Academic Association J., vol. 6, no. 5, 2003, pp. 1-12.
  2. W. Seo and M. Jun, "A Study on the Realization of Diskless and Stateless Security Policy Based High-speed Synchronous Network Infrastructure," J. of the Korea Institute of Electronic Communication Sciences, vol. 6, no. 5, 2011, pp. 676-679.
  3. W. Seok and M. Jun, "A Study on the 3D-Puzzle Security Policy in Integrated Security System Network," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 4, 2010, pp. 425-434.
  4. J. Song, H. Takakura, and Y. Kwon, "A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts," The 2008 Int. Symp. on Applications and the Internet(SAINT2008), The IEEE CS Press, Aug. 2008, pp. 51-56.
  5. C. Kim, D. Kang, and I. Euom, "The Case of Novel Attack Detection using Virtual Honeynet," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 2, 2012, pp. 279-285.
  6. P. Mun, "Honeypot and Honeynet for Network Security Analysis," Collected Papers of Pyeongtaek University, vol. 16, 2002, pp. 353-363.
  7. T. Ban, L. Zhu, J. Shimamura, S. Pang, D. Inoue, and K. Nakao, "Behavior Analysis of Long-term Cyber Attacks in the Darknet," ICONIP (5), 2012, pp. 620-628.

Cited by

  1. Problem Analysis and Countermeasures Research through Security Threat Cases of Physical Security Control Systems vol.19, pp.1, 2016, https://doi.org/10.9717/kmms.2016.19.1.051