DOI QR코드

DOI QR Code

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation

실시간 해킹, 탐지 및 추적관리 ICT 융합 보안 솔루션 시험평가

  • Kim, Seung-Bum (Dept. of Information Management, Graduate School of Venture, Hoseo University) ;
  • Yang, Hae-Sool (Dept. of Information Management, Graduate School of Venture, Hoseo University)
  • 김승범 (호서대학교 벤처대학원 정보경영학과) ;
  • 양해술 (호서대학교 벤처대학원 정보경영학과)
  • Received : 2015.02.18
  • Accepted : 2015.04.20
  • Published : 2015.04.28

Abstract

Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.

최근 다양한 불특정 다수의 해킹 및 반복되는 DDoS 사이버테러 공격을 이해하고, 그 해결책을 비로소 공격 기법에서 찾을 수 있었다. 공격자와 방어자, 공격 기법과 방어 기법의 접목이라는 자유로운 연구 방식은 항상 엉뚱함에서 가능성을 발견해가는 도전이라 할 수 있다. 본 논문에서는 "KWON-GA"라는 세계적인 화이트 해커들 개발진이 오랜 경험의 침투 및 진단을 통해, 공격이 최상의 방어라는 미명하에 방어의 목적으로 구현된 지식 정보 보안 솔루션을 고객이 운용 중인 시스템 환경에 맞추어 필요한 기술을 적용하는 커스터마이징 정책으로 맞춤 솔루션을 제공할 수 있으며, 독창적인 원천기술로 처리되어 탐색이 불가능하고 내부적으로 유출되는 경우에도 분석이 되지 않아 해커에게 분석되어 취약점을 노출하거나 해킹의 수단으로 악용되지 않는 ITC융합 보안 솔루션을 시험평가 하였다.

Keywords

References

  1. The 12th Conference of Defense Privacy and password Defense Security Command, pp. 34-61, pp. 113-124, 2014. 11. 07.
  2. Four nemon Against Cybercrime scale embodied in expense reports. 2014.
  3. Sung Jin Ahn, Kyung Ho Lee, Won Hyung Park. Study of Security Control pp183-245. 2013. 05.
  4. NSHC 3.20 cyberterrorism incident reports, 2013.
  5. NSHC 6.25 Cyber Terrorism Analysis Report, 2013.
  6. CERT Insider Threat Center(2011). Insider Threat Control : Using a SIEM signature to detect potential precursors to IT Sabotage. 2011.
  7. Jung Ho Eom, Sung Soo Choi, Tae Myung Jung, Introduction of Cyber Warfare, pp31-106, 2012.
  8. Sang Yong Choi, Reconstruction of hacking incidents, pp. 287-324, 2013, 07.
  9. Dae Woo Park, Theory of Network security, 2009.
  10. Dae Woo Park, Jung Man Seo. "Research of Security method for TCP/IP attack", Journal of the Korea Computer Information Association, Vol. 10, No. 5 pp. 217-226. 2005, 11. 30.
  11. Hoon Bae Gil, "A Study on Security Policy about PC communication", Master's thesis Graduate School of Polytechnic, Yonsei University, 1996.
  12. CERT/Coordination Center, "CSIRT Frequently Asked Questions," Pittsburgh, Pa.:CMU/SEI, 2007.
  13. Tae Myung Jung, CERT's functions and roles, education in course of operating CERT, 2002.
  14. Internet Security / Web Hacking domestic hacking case http://www.ahnlab.com 2014. 05. 09.
  15. Cuvepia Profile New Leader of Integrated Security Solution www.cuvepia.com(2013.04).