DOI QR코드

DOI QR Code

Improved Security Monitoring and Control Using Analysis of Cyber Attack in Small Businesses

중소기업 유해트래픽 분석을 통한 보안관제 개선 방안

  • Hong, Jun Suk (Graduate School of Public and Information Technology, Seoul National University of Science and Technology) ;
  • Lim, Young Hwan (Graduate School of Public and Information Technology, Seoul National University of Science and Technology) ;
  • Park, Won Hyung (Department of Cyber Security, Far East University) ;
  • Kook, Kwang Ho (College of Business and Technology, Seoul National University of Science and Technology)
  • Received : 2014.10.28
  • Accepted : 2014.11.25
  • Published : 2014.11.30

Abstract

Recent, Secure the small and medium-sized enterprises from advanced and intelligence cyber threat, 24 hours of prevention, detection and analysis is essential. Small and Medium Business monitoring center is operated by government financial support to protect and prevent these threats. Currently it provides security to about 900 small and medium-sized enterprises. This paper studies abnormal and attack packets from small and medium-sized businesses[enterprises] which is monitored by Small and Medium Business monitoring center and provides improvement of security control for small and medium-sized enterprises.

최근 지능화 고도화 되고 있는 사이버 위협으로부터 중소기업을 보호하기 위해서는 24시간 예방 탐지 분석 대응 해 주는 보안관제가 필수적이다. 이러한 중소기업의 보안관제를 지원하기 위해 정부로부터 예산지원을 받아 중소기업기술지킴센터가 구축되어 운영 중이며, 현재 900여 개 중소기업에 대해 보안관제서비스를 지원하고 있다. 본 논문에서는 중소기업 기술지킴센터에서 보안관제서비스를 지원하고 있는 중소기업들의 이상트래픽에 대해 살펴보고 중소기업의 보안관제 개선방안을 제시하였다.

Keywords

References

  1. Ahn, S. J., Lee, K. H., and Park, W. H., "Security Monitering and Control," Ehanmidia, pp. 212-244, 2014.
  2. Center for Strategic and International Studies, "Net Losses : Estimating the Global Cost of Cybercrime," Mcafee, 2014. 6. 9.
  3. Han, C. H., Chai, S. W., and Yoo, B.-J., "A Quantitative Assessment Model of Private Information Breach," Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 17-31, 2011. https://doi.org/10.7838/jsebs.2011.16.4.017
  4. Hyun, T. W., "Attack Method and Countermeasure using SNMP Vulnerability," Dongseo University CNSL, 2009.
  5. Inca Internet Inc. Ltd, "2014 year security report," 2013. 11. 29.
  6. Kim, C. H., "Security Threat and Countermeasure of financial transactions," Privacy Security Conference, 2010.
  7. KISA, "Internet Incident Response Report," 2014.
  8. Korea Technology and Information Promotion Agency for SMBs, "2013 Small and Medium Business Technology Security and Research," 2013.
  9. Lee, Y. and Larsen, K. R., "Threat of Coping Appraisal : Determinants of SMB Executives' Decision to Adopt Anti-Malware Software," European Journal of Information Systems, Vol. 18, pp. 177-187, 2009. https://doi.org/10.1057/ejis.2009.11
  10. Nho, M. S. and Lee, S. Y., "Industrial Security of Small and Medium Business Research," Korea Association for Public Administration, Vol. 44, No. 3, pp. 239-259, 2013.
  11. Park, S. T., "2013 year Main Incident Case and Response," 2013 Hacking Defance Work shop, 2013.

Cited by

  1. An Enhancement of Optimized Detection Rule of Security Monitoring and Control for Detection of Cyberthreat in Location-Based Mobile System vol.2017, 2017, https://doi.org/10.1155/2017/8501976
  2. 중소기업 프로파일링 분석을 통한 기술유출 방지 및 보호 모형 연구 vol.27, pp.1, 2014, https://doi.org/10.5859/kais.2018.27.1.171