@article{ART001941807},
author={한창우 and Huy-Kang Kim and Kim, Eunjin},
title={A Study on the Improvement of Security Monitoring in the Separate Network Environment},
journal={Journal of Knowledge Information Technology and Systems},
issn={1975-7700},
year={2014},
volume={9},
number={6},
pages={805-819}
TY - JOUR
AU - 한창우
AU - Huy-Kang Kim
AU - Kim, Eunjin
TI - A Study on the Improvement of Security Monitoring in the Separate Network Environment
JO - Journal of Knowledge Information Technology and Systems
PY - 2014
VL - 9
IS - 6
PB - Korea Knowledge Information Technology Society
SP - 805
EP - 819
SN - 1975-7700
AB - Internal network connected to the internet are vulnerable to external attack. A consensus of awareness of that problem are spreading. As solutions to that problem, To prevent any damage on the system in the organization, The network separation obligation are spreading. Even if the intranet operates as a closed network by separating the internet can not be guaranteed to be secure. Security threats posed by malicious code are still present, such as stuxnet which works on control network that operates on a closed network. User carelessness, internet connect by intranet PC due to malicious intent, information leakage through the USB, an influx of malicious code to intranet, and using a technique for transferring data between separate networks without the use data transmission system for secure data transfer can be transferred uncontrolled data between internet and intranet. Also, even if network separation is completed insider threat is still present. Network separation made a difference of the traffic form occurring in each of the network, and the characteristics of the security log was affected. Accordingly, separately many researching for the internet about malicious traffic detection, need a plan that can effectively detect anomalies in the security log occurring in the interanet. In this study, Analysis of the characteristics of the security log occurring in physically separate the network environment focusing on the interanet and proposes a model for efficiently performing the security control.
KW - Network Separation;Security Monitoring and Control;Log Analysis
DO -
UR -
ER -
한창우, Huy-Kang Kim and Kim, Eunjin. (2014). A Study on the Improvement of Security Monitoring in the Separate Network Environment. Journal of Knowledge Information Technology and Systems, 9(6), 805-819.
한창우, Huy-Kang Kim and Kim, Eunjin. 2014, "A Study on the Improvement of Security Monitoring in the Separate Network Environment", Journal of Knowledge Information Technology and Systems, vol.9, no.6 pp.805-819.
한창우, Huy-Kang Kim, Kim, Eunjin "A Study on the Improvement of Security Monitoring in the Separate Network Environment" Journal of Knowledge Information Technology and Systems 9.6 pp.805-819 (2014) : 805.
한창우, Huy-Kang Kim, Kim, Eunjin. A Study on the Improvement of Security Monitoring in the Separate Network Environment. 2014; 9(6), 805-819.
한창우, Huy-Kang Kim and Kim, Eunjin. "A Study on the Improvement of Security Monitoring in the Separate Network Environment" Journal of Knowledge Information Technology and Systems 9, no.6 (2014) : 805-819.
한창우; Huy-Kang Kim; Kim, Eunjin. A Study on the Improvement of Security Monitoring in the Separate Network Environment. Journal of Knowledge Information Technology and Systems, 9(6), 805-819.
한창우; Huy-Kang Kim; Kim, Eunjin. A Study on the Improvement of Security Monitoring in the Separate Network Environment. Journal of Knowledge Information Technology and Systems. 2014; 9(6) 805-819.
한창우, Huy-Kang Kim, Kim, Eunjin. A Study on the Improvement of Security Monitoring in the Separate Network Environment. 2014; 9(6), 805-819.
한창우, Huy-Kang Kim and Kim, Eunjin. "A Study on the Improvement of Security Monitoring in the Separate Network Environment" Journal of Knowledge Information Technology and Systems 9, no.6 (2014) : 805-819.