#Àüü±â»ç
#½ÃÅ¥¸®Æ¼¿ùµå
#»ç°Ç»ç°í
#º¸¾È¸®Æ÷Æ®
#AI º¸¾È
#IP
Distributed Intrusion Detection Systems : An Introduction and Review ¿ä¾à |
º¸¾È ¿î¿µ °ü¸® >> º¸¾È ¸ðµ¨ | |
| ÀÛ¼ºÀÚ | Ȳ±³¼÷ | ÀÛ¼ºÀÏÀÚ | 2010-01-11 | ||
| ̧ ̵ |
|
Á¶È¸¼ö | 11000 | ||
| ´Ù¿î·Îµå¼ö | 170 | ||||
| ÆÄ ÀÏ | |||||
Intrusion Detection SystemsÀº ªÀº ½Ã°£ ³»¿¡ Èû, ¹üÀ§¿¡¼ ºü¸£°Ô ¼ºÀåÇß´Ù. ´ëºÎºÐÀÇ IDS´Â ºñ½ÁÇÑ ±¸Á¶·Î ±¸¼ºµÇ¾î ÀÖ´Ù:agent´Â management system¿¡ ŽÁö ³»¿ëÀ» º¸°íÇÑ´Ù. ÃÖ±Ù¿¡ ¾ÇÀÇ ³×Æ®¿öÅ© Ȱµ¿ÀÌ Áõ°¡Çß´Ù. Distributed IDS´Â single IDS¿¡ ºñÇØ ´É·ÂÀÌ Áõ°¡Çߴµ¥ À̰ÍÀº Áö¿ªÀûÀ¸·Î ºÐ»êµÇ¾î ÀÖ´Â ¼ö¸¹Àº agent·ÎºÎÅÍ events¸¦ databaseÈ ½ÃÄѼ attack correlation engine¿¡ °áÇÕÇß´Ù. À̰ÍÀº ÇöÀç ¹ß»ýÇϰųª ¹ß»ýÇÒ °¡´É¼ºÀÌ ÀÖ´Â attack pattern°ú security event¸¦ Á¦°øÇÑ´Ù. ¸¹Àº Distributed IDS´Â ¼ö³â°£ Àü°³µÇ°í, À§Çù º¯È¿¡ ºü¸£°Ô ¹ßÀüµÇ°í ÀÖ´Ù. ¿©±â¿¡¼´Â data source, notification tools, available agents, statistical reporting tool and linkage, vulnerability information¸¦ ±âÁØÀ¸·Î ºñ±³ÇÏ°í ³íÀÇÇØ º¸°Ú´Ù. |
|
|
| ÃßõÇϱâ(µî·ÏµÈ ÀڷḦ Æò°¡ÇØ ÁÖ¼¼¿ä.) | ||
|
|
1
½ÄÀ½·á ±â¾÷µµ ·£¼¶¿þ¾î °øÆ÷...¿¡¾²Çªµå, ...
2
¹é¾÷ ¹«·ÂÈ ·£¼¶¿þ¾î ¡®¸ð³ë·Ï¡¯ Ȱ¹ßÈ÷ À¯Åë...
3
[À̽´Ä®·³] AI Àλç°ü¸®ÀÇ ±×¸²ÀÚ, ¡®¹ýÀû...
4
°æºÏ´ë¡¤°è¸í´ë¡¤¿µÁøÀü¹®´ë, Áö¿ª ±â¾÷¿¡ ±â¼ú...
5
¸¶ÀÌÅ©·Î¼ÒÇÁÆ® Ŭ¶ó¿ìµå °Ü³É...°ø½Ä ¾Û°ú ...
RSS ¼ºñ½º|¡¸¿¸°º¸µµ¿øÄ¢¡¹ ´ç ¸Åü´Â µ¶ÀÚ¿Í ÃëÀç¿ø µî ´º½ºÀÌ¿ëÀÚÀÇ ±Ç¸® º¸ÀåÀ» À§ÇØ ¹Ý·ÐÀ̳ª Á¤Á¤º¸µµ, ÃßÈ帵µ¸¦ ¿äûÇÒ ¼ö Àִ â±¸¸¦ ¿¾îµÎ°í ÀÖÀ½À» ¾Ë·Áµå¸³´Ï´Ù.
°íÃæÃ³¸®ÀÎ ±ÇÁØ(kwonjun@boannews.com)