본문 바로가기
  • Home

Security vulnerabilities analysis in Network Systems based on the Hacking Incidents

  • Journal of Knowledge Information Technology and Systems
  • Abbr : JKITS
  • 2010, 5(3), pp.1-9
  • Publisher : Korea Knowledge Information Technology Society
  • Research Area : Interdisciplinary Studies > Interdisciplinary Research
  • Published : June 30, 2010

Bong-Han Kim 1 이봉근 2 길민욱 3

1청주대학교
2(주)에이티엔
3문경대학교

Candidate

ABSTRACT

In this paper, possible security vulnerabilities analysis in network system environments are studied by analyzing previous hacking incidents. The paper suggests a method to identify problems with the files tampered by security attacks as well as to analyze the related log files and processes. In addition, tools used in attacks are analyzed to find efficient ways to apply security enhancement tools, and security vulnerabilities in network protocols and their countermeasures are also examined. Possible security vulnerabilities is analyzed following a "query-and-response" approach, so that they can be easily applicable to similar attacks detected in the future.

Citation status

* References for papers published after 2023 are currently being built.