Journal of Information Technology Applications and Management
- Volume 13 Issue 4
- /
- Pages.141-153
- /
- 2006
- /
- 1598-6284(pISSN)
- /
- 2508-1209(eISSN)
A Study on the Intrusion Detection Method using Firewall Log
방화벽 로그를 이용한 침입탐지기법 연구
- Published : 2006.12.31
Abstract
According to supply of super high way internet service, importance of security becomes more emphasizing. Therefore, flawless security solution is needed for blocking information outflow when we send or receive data. large enterprise and public organizations can react to this problem, however, small organization with limited work force and capital can't. Therefore they need to elevate their level of information security by improving their information security system without additional money. No hackings can be done without passing invasion blocking system which installed at the very front of network. Therefore, if we manage.isolation log effective, we can recognize hacking trial at the step of pre-detection. In this paper, it supports information security manager to execute isolation log analysis very effectively. It also provides isolation log analysis module which notifies hacking attack by analyzing isolation log.