DOI QR코드

DOI QR Code

Improved Integrated Monitoring System Design and Construction

개선된 통합모니터링 시스템 설계 및 구축

  • 전병진 (동명대학교 정보보보학과) ;
  • 윤덕병 (동명대학교 경영학과) ;
  • 신승수 (동명대학교 정보보보학과)
  • Received : 2017.02.03
  • Accepted : 2017.02.20
  • Published : 2017.02.28

Abstract

In order to prevent information leakage, companies are monitoring the information leakage by internal staff by building individual security system and integrated monitoring system of firewall and DLP function. Especially, many log data of the integrated monitoring system cause time and money, and it is difficult to detect information leak of fast malicious personnel due to system slowdown. It is necessary to speed up the system by digitizing large log data for each day and person for fast information leakage detection and there is a need to develop and manage a continuous monitoring program for the information leakage indications personnel. Therefore, we propose an improved integrated monitoring system using log data by date and individual data.

기업에서는 정보유출을 막기 위해 방화벽, DLP 기능의 개별 보안시스템과 통합모니터링 시스템을 구축하여 내부직원에 의한 정보유출을 상시 모니터링하고 있다. 특히 통합모니터링 시스템의 많은 로그 데이터 때문에 시간과 금전적인 비용이 많이 발생하고 있으며, 시스템 속도 저하로 인해 빠른 정보유출 인원을 감지하기 힘들다. 빠른 정보유출 감지를 위해 대용량의 로그 데이터를 일자별, 개인별로 수치화하여 시스템 속도를 빠르게 할 필요가 있다. 그리고 정보유출 징후 인원에 대한 지속적인 모니터링 프로그램을 개발해서 관리할 필요성이 있다.

Keywords

References

  1. J. H. Kim and H. J. Kim, "Prevention of information leakage and privacy violation," Korea Institute Of Information Security And Cryptology, REVIEW OF KIISC, Vol. 21, No. 5, pp. 45-49, Aug. 2011.
  2. A. B. Garba, J. Armarego, D. Murray and W. Kenworthy, "Review of the information security and privacy challenges in BYOD environments," Journal of Information privacy and security, pp. 38-54, 2015.
  3. M. S. Kim and D. W. Kang, "Information leakage prevention system design for small business," Feb. 2008.
  4. J. Y. Lee and S. Y. Kang, "Design and Verification of the Integrated Log Analysis System for Enterprise Information Security," Journal of Digital Contents Society, Vol. 9 No. 3, pp. 491-498, Sept. 2008.
  5. K. S. Yu, S. H. Im and H. B. KIM, "Technology trend and development direction of integrated log management system," Korea Institute Of Information Security And Cryptology, Korea Institute Of Information Security And Cryptology, Vol. 23, No. 6, pp. 90-99, Dec. 2013.
  6. S. J. Park and J. I. Lim, "A study on the development of SRI(Security Risk Indicator)-based monitoring system to prevent the leakage of personally identifiable information," Korea Institute Of Information Security And Cryptology, Journal of the Korea Institute of Information Security & Cryptology, pp. 637-644, Jun. 2012.
  7. D. S. Kim and S. R. Kim, "A Study on Monitoring Method about Information Leakage Sign using Application Log," Journal of Korean Institute of Information Technology, pp. 83-91, 2013
  8. M. B. Hyun and S. J. Lee, "The Proactive Threat Protection Method from Predicting Resignation Throughout DRM Log Analysis and Monitor," Korea Institute Of Information Security And Cryptology, Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 2, pp. 369-375, Apr. 2016. https://doi.org/10.13089/JKIISC.2016.26.2.369
  9. Y. H. Kim and E. N. Huh, "Personalized Analysis System for Enterprise Log Data Analysis," Korea Institute Of Information Security And Cryptology, Journal of the Korea Institute of Information Security & Cryptology, Vol. 23, No. 6, pp. 1149-1150, Jun. 2014.
  10. S. H. Yoon, "Study on the Technical Security Factor for the Implementation of Secure DB System," The Korean Society Of Computer And Information, Journal of the Korea Society of Computer and Information, Vol. 19, No. 12, pp. 143-152, Dec. 2014. https://doi.org/10.9708/jksci.2014.19.12.143
  11. C. J. Ryu, M. H. Han and S. J. Han, "Design of Log Management System based on Document Database for Big Data Management," The Korea Institute of Information and Communication Engineering, Journal of the Korea Institute of Information and Communication Engineering, Vol. 19, No. 11, pp. 2629-2636, Nov. 2015. https://doi.org/10.6109/jkiice.2015.19.11.2629
  12. Y. H. Kim and E. N. Huh, "Log Analysis Supporting System based on Log Data for Efficient Big Data Analysis," KOREA INFORMATION SCIENCE SOCIETY, Journal of the Korea information science society, pp. 936-938, Dec. 2014.
  13. J. H. Kim, J. I. Lim and H. K. Kim, "Collaborative security response by interworking between multiple security solutions," Korea Institute Of Information Security And Cryptology, Journal of the Korea Institute of Information Security & Cryptology, Vol. 23, NO. 1, pp. 69-79, Fev. 2013. https://doi.org/10.13089/JKIISC.2013.23.1.069
  14. K. M. Ahn, J. Y. Lee, D. M. Yang and B. H. Lee, "Design and Implementation of a Hadoop-based Efficient Security Log Analysis System," Journal of the Korea Institute of Information and Communication Engineering, Vol. 19, No. 8, pp. 1797-1804, Aug. 2015. https://doi.org/10.6109/jkiice.2015.19.8.1797