MENU
Library HOME > Library > º¸¾È ÄÁÅÙÃ÷

º¸¾È ÄÁÅÙÃ÷


Distributed Intrusion Detection Systems : An Introduction and Review ¿ä¾à

º¸¾È ¿î¿µ °ü¸® >> º¸¾È ¸ðµ¨ 
ÀÛ¼ºÀÚ È²±³¼÷ ÀÛ¼ºÀÏÀÚ 2010-01-11
Ãß   Ãµ Á¶È¸¼ö 10533
Æ÷ÀÎÆ® ¹«·á ´Ù¿î·Îµå¼ö 170
ÆÄ   ÀÏ  a023.pdf
»ó¼¼¼³¸í

Intrusion Detection SystemsÀº ªÀº ½Ã°£ ³»¿¡ Èû, ¹üÀ§¿¡¼­ ºü¸£°Ô ¼ºÀåÇß´Ù. ´ëºÎºÐÀÇ IDS´Â ºñ½ÁÇÑ ±¸Á¶·Î ±¸¼ºµÇ¾î ÀÖ´Ù:agent´Â management system¿¡ ŽÁö ³»¿ëÀ» º¸°íÇÑ´Ù. ÃÖ±Ù¿¡ ¾ÇÀÇ ³×Æ®¿öÅ© È°µ¿ÀÌ Áõ°¡Çß´Ù. Distributed IDS´Â single IDS¿¡ ºñÇØ ´É·ÂÀÌ Áõ°¡Çߴµ¥ ÀÌ°ÍÀº Áö¿ªÀûÀ¸·Î ºÐ»êµÇ¾î ÀÖ´Â ¼ö¸¹Àº agent·ÎºÎÅÍ events¸¦ databaseÈ­ ½ÃÄѼ­ attack correlation engine¿¡ °áÇÕÇß´Ù. ÀÌ°ÍÀº ÇöÀç ¹ß»ýÇϰųª ¹ß»ýÇÒ °¡´É¼ºÀÌ ÀÖ´Â attack pattern°ú security event¸¦ Á¦°øÇÑ´Ù. ¸¹Àº Distributed IDS´Â ¼ö³â°£ Àü°³µÇ°í, À§Çù º¯È­¿¡ ºü¸£°Ô ¹ßÀüµÇ°í ÀÖ´Ù. ¿©±â¿¡¼­´Â data source, notification tools, available agents, statistical reporting tool and linkage, vulnerability information¸¦ ±âÁØÀ¸·Î ºñ±³ÇÏ°í ³íÀÇÇØ º¸°Ú´Ù.



COPYRIGHT CISOKOREA.ORG. ALL RIGHTS RESERVED.
°³ÀÎÁ¤º¸Ã³¸®¹æħ