Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0283 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2015-12-16 | ÃÑÆäÀÌÁö | 15 |
ÇѱÛÇ¥Áظí | Snort ±â¹Ý ħÀÔŽÁö½Ã½ºÅÛ Å½Áö ±ÔÄ¢ ¿ä±¸»çÇ× | ||
¿µ¹®Ç¥Áظí | Requirements of Detection Rules in Intrusion Detection System based on Snort | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº ÃÖ±ÙÀÇ ÇØÅ·․¾Ç¼ºÄÚµå Á¦ÀÛ À¯Æ÷ µî ºü¸£°Ô ¹ßÀüÇÏ´Â ½ÅÁ¾ »çÀ̹ö À§ÇùÀ» ŽÁöÇϱâ À§Çؼ »çÀ̹ö °ø°Ý ÆÐŶ ³»¿ëÀ» ÀÌÇØÇÏ°í À̸¦ ³×Æ®¿öÅ© ȯ°æ¿¡ ¸Â´Â ÃÖÀûÀÇ Ä§ÀÔŽÁö ±ÔÄ¢À» Ç¥ÁØ Á¦½Ã ÇÑ´Ù. Snort ŽÁö ±ÔÄ¢À» ±â¹ÝÀ¸·Î Çʼö ŽÁö ±ÔÄ¢ÀÇ ¸ðÇü°ú ¿É¼ÇÀ» ¼³°èÇÏ°í ŽÁö ¼¾¼ÀÇ ¼º´É°ú ¿ÀŽÀ» °í·ÁÇÏÁö ¾Ê´Â Á¤Ã¥ µî À߸øµÈ Á¤Ã¥ÀÇ ÀÌÇØ¡¤ºÐ¼®À» ÅëÇؼ °¡Àå ÃÖÀûÈµÈ Å½Áö ±ÔÄ¢ Á¦ÀÛ ±âÁØÀ» Á¦¾ÈÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard develops standard IDS rules by understanding the packet contents to detect the cyber-hacking and optimize rules to network environment. We will build the model of detection rules based on the SNORT's, options and analyze wrong policy of false positives detection sensors to proposes an optimized detection rules. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0283.pdf |