• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document : 10 / 25 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) ÆÐŶĸÃĸ¦ ÀÌ¿ëÇÑ Ä§ÀÔŽÁö ½Ã½ºÅÛÀÇ ±¸Çö
¿µ¹®Á¦¸ñ(English Title) Implementation of Intrusion Detection System Using Packet Capture
ÀúÀÚ(Author) ±è¿µÁø   ÇѽÂÁ¶   Young-jin Kim   Seung-jo Han  
¿ø¹®¼ö·Ïó(Citation) VOL 06 NO. 06 PP. 0833 ~ 0842 (2002. 10)
Çѱ۳»¿ë
(Korean Abstract)
ÄÄÇ»ÅÍ È®»ê ¹× ³×Æ®¿öÅ© ÀÌ¿ëÀÇ ±Þ°ÝÇÑ Áõ°¡¿¡ µû¸¥ ºÎÀÛ¿ëÀ¸·Î ÄÄÇ»ÅÍ º¸¾È ¹®Á¦°¡ Áß¿äÇÏ°Ô ´ëµÎµÇ°íÀÖ´Ù. °ø°ÝÀÚµéÀÇ °ø°ÝÀº ¿î¿µÃ¼Á¦, ÇÁ·ÎÅäÄÝ, ÀÀ¿ëÇÁ·Î±×·¥¿¡¼­ Ãë¾àÁ¡À» ÀÌ¿ëÇÏ°í ÀÖÀ¸¸ç ±× ±â¼úÀÌ °íµµÈ­, Àü¹®È­ µÇ¾î°¡°í ÀÖ´Ù. ±×·¯¹Ç·Î Á¤º¸Åë½Å¸ÁÀÇ ±â¹Ý±¸Á¶¸¦ ±¸¼ºÇÏ´Â ±¸¼º¿ä¼Òµé¿¡ ´ëÇѱ¸Á¶, °ü¸®¿¡¼­ÀÇ ¹®Á¦Á¡À» ÇØ°áÇϱâ À§ÇÑ ±â¹Ý±¸Á¶ º¸È£±â¼úÀÌ ÇÊ¿äÇÏ´Ù. º» ³í¹®¿¡¼­´Â È¿°úÀûÀ¸·Î ħÀÔÀÚ¸¦ Â÷´ÜÇÏ¿© Áß¿ä ½Ã½ºÅÛ¿¡¼­ ºÐ¸®½ÃÅ°±â À§ÇÑ Ä§ÀÔŽÁö½Ã½ºÅÛÀ» °³¹ßÇÏ°í, IDS ¸ðµ¨À» ¼³°è ¹× ±¸ÇöÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of use of computers. A attack of intruders using a vulnerability of operating system, protocol and application programs. And so, The attack methods is to be high technology and professional. Thus It must be necessity that we necessary a solution to structure, management for framework of information technology. This paper develope intrusion detecting system for separating intruders form critical system and design IDS model and implementation of it
Å°¿öµå(Keyword) ħÀÔŽÁö   ħÀÔÀÚ   ±â¹Ý±¸Á¶   º¸È£±â¼ú  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå