A Study on the Intrusion Detection Method using Firewall Log

방화벽 로그를 이용한 침입탐지기법 연구

  • 윤성종 (한밭대학교 정보통신전문대학원 컴퓨터공학과) ;
  • 김정호 (한밭대학교 정보통신전문대학원 컴퓨터공학과)
  • Published : 2006.12.31

Abstract

According to supply of super high way internet service, importance of security becomes more emphasizing. Therefore, flawless security solution is needed for blocking information outflow when we send or receive data. large enterprise and public organizations can react to this problem, however, small organization with limited work force and capital can't. Therefore they need to elevate their level of information security by improving their information security system without additional money. No hackings can be done without passing invasion blocking system which installed at the very front of network. Therefore, if we manage.isolation log effective, we can recognize hacking trial at the step of pre-detection. In this paper, it supports information security manager to execute isolation log analysis very effectively. It also provides isolation log analysis module which notifies hacking attack by analyzing isolation log.

Keywords