@article{ART001461815},
author={Bong-Han Kim and 이봉근 and 길민욱},
title={Security vulnerabilities analysis in Network Systems based on the Hacking Incidents},
journal={Journal of Knowledge Information Technology and Systems},
issn={1975-7700},
year={2010},
volume={5},
number={3},
pages={1-9}
TY - JOUR
AU - Bong-Han Kim
AU - 이봉근
AU - 길민욱
TI - Security vulnerabilities analysis in Network Systems based on the Hacking Incidents
JO - Journal of Knowledge Information Technology and Systems
PY - 2010
VL - 5
IS - 3
PB - Korea Knowledge Information Technology Society
SP - 1
EP - 9
SN - 1975-7700
AB - In this paper, possible security vulnerabilities analysis in network system environments are studied by analyzing previous hacking incidents. The paper suggests a method to identify problems with the files tampered by security attacks as well as to analyze the related log files and processes. In addition, tools used in attacks are analyzed to find efficient ways to apply security enhancement tools, and security vulnerabilities in network protocols and their countermeasures are also examined. Possible security vulnerabilities is analyzed following a "query-and-response" approach, so that they can be easily applicable to similar attacks detected in the future.
KW - Hacking;Countermeasure;TCP/IP;Security vulnerabilities;Log analysis
DO -
UR -
ER -
Bong-Han Kim, 이봉근 and 길민욱. (2010). Security vulnerabilities analysis in Network Systems based on the Hacking Incidents. Journal of Knowledge Information Technology and Systems, 5(3), 1-9.
Bong-Han Kim, 이봉근 and 길민욱. 2010, "Security vulnerabilities analysis in Network Systems based on the Hacking Incidents", Journal of Knowledge Information Technology and Systems, vol.5, no.3 pp.1-9.
Bong-Han Kim, 이봉근, 길민욱 "Security vulnerabilities analysis in Network Systems based on the Hacking Incidents" Journal of Knowledge Information Technology and Systems 5.3 pp.1-9 (2010) : 1.
Bong-Han Kim, 이봉근, 길민욱. Security vulnerabilities analysis in Network Systems based on the Hacking Incidents. 2010; 5(3), 1-9.
Bong-Han Kim, 이봉근 and 길민욱. "Security vulnerabilities analysis in Network Systems based on the Hacking Incidents" Journal of Knowledge Information Technology and Systems 5, no.3 (2010) : 1-9.
Bong-Han Kim; 이봉근; 길민욱. Security vulnerabilities analysis in Network Systems based on the Hacking Incidents. Journal of Knowledge Information Technology and Systems, 5(3), 1-9.
Bong-Han Kim; 이봉근; 길민욱. Security vulnerabilities analysis in Network Systems based on the Hacking Incidents. Journal of Knowledge Information Technology and Systems. 2010; 5(3) 1-9.
Bong-Han Kim, 이봉근, 길민욱. Security vulnerabilities analysis in Network Systems based on the Hacking Incidents. 2010; 5(3), 1-9.
Bong-Han Kim, 이봉근 and 길민욱. "Security vulnerabilities analysis in Network Systems based on the Hacking Incidents" Journal of Knowledge Information Technology and Systems 5, no.3 (2010) : 1-9.