• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹Á¤º¸Åë½ÅÇÐȸ Çмú´ëȸ > 2010³â Ãá°èÇмú´ëȸ

2010³â Ãá°èÇмú´ëȸ

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) Áö´ÉÇü SQL Query ºÐ¼®À» ÅëÇÑ Application Layer ¿ªÃßÀû ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) A Study of Application Layer Traceback Through Intelligent SQL Query Analysis
ÀúÀÚ(Author) ¹éÁ¾ÀÏ   ¹Ú´ë¿ì   Jong-Il Baek   Dea-Woo Park  
¿ø¹®¼ö·Ïó(Citation) VOL 14 NO. 01 PP. 0265 ~ 0268 (2010. 05)
Çѱ۳»¿ë
(Korean Abstract)
ÇöÀçÀÇ IP À§ÁÖÀÇ ¿ªÃßÀûÀº Proxy¿Í ¿ìȸ±â¹ýÀÇ ¹ß´Þ·Î ÀÎÇÏ¿© Real IP ¿ªÃßÀû¿¡ ¾î·Á¿òÀÌ ÀÖ´Ù. ¶ÇÇÑ IP¿ªÃßÀû ÈÄ¿¡µµ ½ÇÁ¦ Source IPÀÎÁö È®ÀÎÀÌ ¾î·Æ´Ù. µû¶ó¼­ º» ³í¹®¿¡¼­´Â Áö´ÉÇü SQL Query¿¡ ´ëÇÑ field, column, table µîÀÇ ¿ä¼Ò°ª°ú ¸ÅĪµÇ´Â key°ªÀ» ºÐ¼®ÇÏ°í ¿©±â¿¡¼­ »ç¿ëµÇ´Â Data°ªÀÇ hit point¸¦ ºÐ¼®ÇÏ¿© ÃÖÃÊ »ç¿ëÀÚ¿¡ ´ëÇÑ Application Layer¸¦ ºÐ¼®ÇÔÀ¸·Î½á IP ¿ªÃßÀû¿¡ ´ëÇÑ Æ÷·»½Ä Áõ°Å·Î »ï´Â´Ù. º» ¿¬±¸´Â Æ÷·»½Ä°ú DBº¸¾È µî ÀüÀÚ°Å·¡ ¹ßÀü¿¡ ±â¿©ÇÒ °ÍÀÌ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Current Traceback is difficult due to the development of bypass technique Proxy and IP-driven to trace the real IP Source IP is the IP traceback after the actual verification is difficult. In this paper, an intelligent about SQL Query field, column, table elements such as analysis of the value and the matching key values and Data used here to analyze source user hit point values for the user to trace the Application Layer IP for the analysis of forensic evidence guided by In this study, including forensic DB security will contribute to the development of electronic trading.
Å°¿öµå(Keyword) IP Traceback   DB Security   SQL(Structured Query Language) Query   Application Layer   Forensic  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå