Development Security agents for Integrated security management of the Educational Network

교육망의 통합보안관리를 위한 보안 에이전트 개발

  • 이도현 ((주)유아이넷/연구소) ;
  • 김현철 (남서울대학교/컴퓨터학과) ;
  • 김점구 (남서울대학교/컴퓨터학과)
  • Received : 2015.03.09
  • Accepted : 2015.03.16
  • Published : 2015.03.30

Abstract

Security infrastructure of Educational Network responds to threats by collecting and analyzing security events from various information protection system based on the integrated management system. Even if this system provides useful and detailed information to the administrator, there are some problems that this system does not provide effective response process and management systems for various threatening situations and the simultaneous threat processes. To solve this problem, we propose and develop security agents that enable the administrator to effectively manage integrated security for Educational Network. The proposed solution provides the administrator with efficient management techniques and process scheduling for various security events so that the administrator can response promptly to problems with the initial threat to Educational Network.

References

  1. 이동영, 김동수, 정태명, "이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구", 한국정보처리학회논문지C, 8C(5) 2001.
  2. 박준홍, 남길현 "대규모 조직에 적합한 계층적 구조의 통합 보안관리 시스템에 관한 연구" 한국정보보호학회지 학술대회지, 2001.
  3. 손우용, 송정길 "통합보안 관리시스템의 침입탐지 및 대응을 위한 보안 정책 모델" 한국컴퓨터정보학회논문지, 9(5) 2004.
  4. 이영석, 능동 네트워크 기반의 능동 보안 관리 시스템 한국통신학회논문지, 29(4C) pp559-569, 2004.
  5. Deron Powell, "Enterprise Security Management (ESM) : Centralizing Management of Your Security Policy" SANS Institute, December 2010
  6. Randy Heffner, "Enterprise Application Security Integration", IT Trends 2012, December 2011
  7. Michael O'neill, "Unix System in a Large Enterprise Environment - Axent ESM", SANS Institute Information security Reading Room, 22 June 2013.
  8. Youngsup Kim , Seung Yub Baek, Geuk Lee(2005) "Intelligent Tool For Enterprise Vulnerability Assessment On Distributed Network Environment using Nessus And OVAL" LNAI3682 pp1056-1061,
  9. Minar N, Gray M, Poop o, Krikorian R, Maes p(2000), "Hive Distributed agents for networking things",IEEE Consurrency, Volume8 pp.24-23 , https://doi.org/10.1109/4434.846191
  10. Filman R.,Linden T(2004.).,"Communicating security agents",proceedings of the 5th Workshop, pp.664-671,
  11. Distributed scan model for Enterprise-Wide network Vulnerability Assessment, http://www.sans.org/rr/paper/5/74.pdf
  12. Erik Kamerling, Three Questions for the October8, 2003 top 20 Briefings, http://www.sans.org/top20/overview03.pdf
  13. Eduardo B. Fernandez, An overview of Internet security, http://www.antibozo.net/ogata/security/overview/,1998
  14. Introduction of OVAL, http://oval.mitre.org/documents/docs-03/intro/intr o.doc
  15. Introduction of CVE, The Key to information sharing, http://cve.mite.org/doc/docs2000/ky_to_inffo_shar.pdf