Distributed Intrusion Detection Systems : An Introduction and Review ¿ä¾à |
º¸¾È ¿î¿µ °ü¸® >> º¸¾È ¸ðµ¨ | |
ÀÛ¼ºÀÚ | Ȳ±³¼÷ | ÀÛ¼ºÀÏÀÚ | 2010-01-11 | ||
Ãß Ãµ | Á¶È¸¼ö | 10476 | |||
´Ù¿î·Îµå¼ö | 170 | ||||
ÆÄ ÀÏ | a023.pdf | ||||
»ó¼¼¼³¸í |
Intrusion Detection SystemsÀº ªÀº ½Ã°£ ³»¿¡ Èû, ¹üÀ§¿¡¼ ºü¸£°Ô ¼ºÀåÇß´Ù. ´ëºÎºÐÀÇ IDS´Â ºñ½ÁÇÑ ±¸Á¶·Î ±¸¼ºµÇ¾î ÀÖ´Ù:agent´Â management system¿¡ ŽÁö ³»¿ëÀ» º¸°íÇÑ´Ù. ÃÖ±Ù¿¡ ¾ÇÀÇ ³×Æ®¿öÅ© È°µ¿ÀÌ Áõ°¡Çß´Ù. Distributed IDS´Â single IDS¿¡ ºñÇØ ´É·ÂÀÌ Áõ°¡Çߴµ¥ ÀÌ°ÍÀº Áö¿ªÀûÀ¸·Î ºÐ»êµÇ¾î ÀÖ´Â ¼ö¸¹Àº agent·ÎºÎÅÍ events¸¦ databaseÈ ½ÃÄѼ attack correlation engine¿¡ °áÇÕÇß´Ù. ÀÌ°ÍÀº ÇöÀç ¹ß»ýÇϰųª ¹ß»ýÇÒ °¡´É¼ºÀÌ ÀÖ´Â attack pattern°ú security event¸¦ Á¦°øÇÑ´Ù. ¸¹Àº Distributed IDS´Â ¼ö³â°£ Àü°³µÇ°í, À§Çù º¯È¿¡ ºü¸£°Ô ¹ßÀüµÇ°í ÀÖ´Ù. ¿©±â¿¡¼´Â data source, notification tools, available agents, statistical reporting tool and linkage, vulnerability information¸¦ ±âÁØÀ¸·Î ºñ±³ÇÏ°í ³íÀÇÇØ º¸°Ú´Ù. |
ÃßõÇϱâ(µî·ÏµÈ ÀڷḦ Æò°¡ÇØ ÁÖ¼¼¿ä.) | ||
|
1
SKÇÏÀ̴нº, ¡®SK hynix¡¯ »çĪ »çÀÌ...2
¿ÀÀ̽ºÅÍ ¹éµµ¾î, MS ÆÀÁî ¼³Ä¡ÆÄÀÏ·Î À§Àå...3
[bnTV] Áõ±Ç°¡°¡ ÁÖ¸ñÇÑ ÀÌ ±â¾÷, 19...4
[¿µÈ&º¸¾È] ¾Æ¹öÁöµéÀÇ ÀÛÀº ¿ë±â, °¡Á¤À»...5
ÇØ¾ç »çÀ̹öº¸¾È, ¼±¹ÚÀÇ Æ¯¼ö¼º °í·ÁÇÑ ´ëÀÀ...¡¸¿¸°º¸µµ¿øÄ¢¡¹ ´ç ¸Åü´Â µ¶ÀÚ¿Í ÃëÀç¿ø µî ´º½ºÀÌ¿ëÀÚÀÇ ±Ç¸® º¸ÀåÀ» À§ÇØ ¹Ý·ÐÀ̳ª Á¤Á¤º¸µµ, ÃßÈ帵µ¸¦ ¿äûÇÒ ¼ö Àִ â±¸¸¦ ¿¾îµÎ°í ÀÖÀ½À» ¾Ë·Áµå¸³´Ï´Ù.
°íÃæó¸®ÀÎ ±Ç ÁØ(editor@boannews.com)