Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0283 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2015-12-16 ÃÑÆäÀÌÁö 15
ÇѱÛÇ¥Áظí Snort ±â¹Ý ħÀÔŽÁö½Ã½ºÅÛ Å½Áö ±ÔÄ¢ ¿ä±¸»çÇ×
¿µ¹®Ç¥Áظí Requirements of Detection Rules in Intrusion Detection System based on Snort
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº ÃÖ±ÙÀÇ ÇØÅ·․¾Ç¼ºÄÚµå Á¦ÀÛ À¯Æ÷ µî ºü¸£°Ô ¹ßÀüÇÏ´Â ½ÅÁ¾ »çÀ̹ö À§ÇùÀ» ŽÁöÇϱâ À§Çؼ­ »çÀ̹ö °ø°Ý ÆÐŶ ³»¿ëÀ» ÀÌÇØÇÏ°í À̸¦ ³×Æ®¿öÅ© ȯ°æ¿¡ ¸Â´Â ÃÖÀûÀÇ Ä§ÀÔŽÁö ±ÔÄ¢À» Ç¥ÁØ Á¦½Ã ÇÑ´Ù. Snort ŽÁö ±ÔÄ¢À» ±â¹ÝÀ¸·Î Çʼö ŽÁö ±ÔÄ¢ÀÇ ¸ðÇü°ú ¿É¼ÇÀ» ¼³°èÇÏ°í ŽÁö ¼¾¼­ÀÇ ¼º´É°ú ¿ÀŽÀ» °í·ÁÇÏÁö ¾Ê´Â Á¤Ã¥ µî À߸øµÈ Á¤Ã¥ÀÇ ÀÌÇØ¡¤ºÐ¼®À» ÅëÇؼ­ °¡Àå ÃÖÀûÈ­µÈ ŽÁö ±ÔÄ¢ Á¦ÀÛ ±âÁØÀ» Á¦¾ÈÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard develops standard IDS rules by understanding the packet contents to detect the cyber-hacking and optimize rules to network environment. We will build the model of detection rules based on the SNORT's, options and analyze wrong policy of false positives detection sensors to proposes an optimized detection rules.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0283.pdf TTAK.KO-12.0283.pdf            

ÀÌÀü
ÀÚµ¿Â÷ ÀüÀÚ Á¦¾î ÀåÄ¡ °£ÀÇ Åë½Å º¸¾È ¿ä±¸ »çÇ×
´ÙÀ½
È£½ºÆ® ÄÄÇ»ÅÍ °³ÀÎ Á¤º¸ º¸È£ Á¦Ç° º¸¾È¼º Æò°¡¸¦ À§ÇÑ º¸¾È ¿ä±¸ »çÇ×