
![]() |
Distributed Intrusion Detection Systems : An Introduction and Review ¿ä¾à |
º¸¾È ¿î¿µ °ü¸® >> º¸¾È ¸ðµ¨ |
![]() |
ÀÛ¼ºÀÚ | Ȳ±³¼÷ | ![]() |
ÀÛ¼ºÀÏÀÚ | 2010-01-11 |
![]() |
̧ ̵ |
![]() |
![]() |
Á¶È¸¼ö | 10630 |
![]() |
´Ù¿î·Îµå¼ö | 170 | |||
![]() |
ÆÄ ÀÏ | ![]() |
![]() |
||
![]() |
Intrusion Detection SystemsÀº ªÀº ½Ã°£ ³»¿¡ Èû, ¹üÀ§¿¡¼ ºü¸£°Ô ¼ºÀåÇß´Ù. ´ëºÎºÐÀÇ IDS´Â ºñ½ÁÇÑ ±¸Á¶·Î ±¸¼ºµÇ¾î ÀÖ´Ù:agent´Â management system¿¡ ŽÁö ³»¿ëÀ» º¸°íÇÑ´Ù. ÃÖ±Ù¿¡ ¾ÇÀÇ ³×Æ®¿öÅ© È°µ¿ÀÌ Áõ°¡Çß´Ù. Distributed IDS´Â single IDS¿¡ ºñÇØ ´É·ÂÀÌ Áõ°¡Çߴµ¥ ÀÌ°ÍÀº Áö¿ªÀûÀ¸·Î ºÐ»êµÇ¾î ÀÖ´Â ¼ö¸¹Àº agent·ÎºÎÅÍ events¸¦ databaseÈ ½ÃÄѼ attack correlation engine¿¡ °áÇÕÇß´Ù. ÀÌ°ÍÀº ÇöÀç ¹ß»ýÇϰųª ¹ß»ýÇÒ °¡´É¼ºÀÌ ÀÖ´Â attack pattern°ú security event¸¦ Á¦°øÇÑ´Ù. ¸¹Àº Distributed IDS´Â ¼ö³â°£ Àü°³µÇ°í, À§Çù º¯È¿¡ ºü¸£°Ô ¹ßÀüµÇ°í ÀÖ´Ù. ¿©±â¿¡¼´Â data source, notification tools, available agents, statistical reporting tool and linkage, vulnerability information¸¦ ±âÁØÀ¸·Î ºñ±³ÇÏ°í ³íÀÇÇØ º¸°Ú´Ù. |
![]() |
ÃßõÇϱâ(µî·ÏµÈ ÀڷḦ Æò°¡ÇØ ÁÖ¼¼¿ä.) | ||
|
1
2
3
4
5
¡¸¿¸°º¸µµ¿øÄ¢¡¹ ´ç ¸Åü´Â µ¶ÀÚ¿Í ÃëÀç¿ø µî ´º½ºÀÌ¿ëÀÚÀÇ ±Ç¸® º¸ÀåÀ» À§ÇØ ¹Ý·ÐÀ̳ª Á¤Á¤º¸µµ, ÃßÈ帵µ¸¦ ¿äûÇÒ ¼ö Àִ â±¸¸¦ ¿¾îµÎ°í ÀÖÀ½À» ¾Ë·Áµå¸³´Ï´Ù.
°íÃæó¸®ÀÎ À¯°æµ¿(editor@boannews.com)