• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö > Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)

Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)

Current Result Document : 1 / 1

ÇѱÛÁ¦¸ñ(Korean Title) ¿ÀǼҽº¸¦ ÀÌ¿ëÇÑ À©µµ¿ì ±â¹Ý PC ·Î±× ¼öÁý ½Ã½ºÅÛ
¿µ¹®Á¦¸ñ(English Title) Windows based PC Log Collection System using Open Source
ÀúÀÚ(Author) ¼ÛÁßÈ£   ±èÇйΠ  À±Áø   Jungho Song   Hakmin Kim   Jin Yoon  
¿ø¹®¼ö·Ïó(Citation) VOL 22 NO. 07 PP. 0332 ~ 0337 (2016. 07)
Çѱ۳»¿ë
(Korean Abstract)
°¢ Á¶Á÷ÀÇ ½Ã½ºÅÛ°ü¸®ÀÚ ¶Ç´Â º¸¾È °ü¸®ÀÚ´Â º¸¾È ħÇØ»ç°í°¡ ¹ß»ýÇÑ °æ¿ì »ç°íÀÇ ¿øÀÎ ºÐ¼®°ú À̸¦ ÅëÇØ °¨¿° ¹× ÇÇÇظ¦ ÀÔÀº ½Ã½ºÅÛ ºÐ¼®À» À§Çؼ­ Á¶Á÷ ¹× ±â°ü¿¡¼­ »ç¿ëµÇ°í ÀÖ´Â ÄÄÇ»Æà ±â±âÀÇ ·Î±× Á¤º¸¸¦ Áö¼ÓÀûÀ¸·Î ¼öÁýÇÏ¿©¾ß ÇÏ¿©¾ß ÇÑ´Ù. ±×¸®°í ¼öÁýµÈ ·Î±×´Â Ãë¾à¼ºÀÌ ÀÖ´Â ±â±â¸¦ ½Äº°ÇÏ¿© º¸¾È»ç°í ¿¹¹æ È°µ¿¿¡µµ È°¿ë ÇÒ ¼ö ÀÖ´Ù. ¶ÇÇÑ, ÃÖ±Ù ¸¹ÀÌ ¹ß»ýÇÏ°í ÀÖ´Â ³»ºÎÀÚ¸¦ ÅëÇÑ Á¤º¸ À¯ÃâÀ» »çÀü¿¡ ¿¹¹æÇÏ´Â µ¥¿¡µµ È°¿ë ÇÒ ¼ö ÀÖ´Ù. ÀÌ¿¡ º» ³í¹®¿¡¼­´Â À©µµ¿ì ½Ã½ºÅÛÀÌ ±âº»À¸·Î Á¦°øÇÏ´Â ±â´É°ú ¸í·É¾î¸¦ »ç¿ë ÇÒ ¼ö ÀÖ´Â ¿ÀǼҽº¸¦ ÀÌ¿ëÇÏ¿© ·Î±× Á¤º¸¸¦ ¼öÁý ½Ã½ºÅÛÀ» °³¹ß ÇÏ¿´´Ù. ±×¸®°í ¼öÁýµÈ ·Î±× Á¤º¸¸¦ ´Ù¾çÇÑ °üÁ¡¿¡¼­ Á¶È¸ ¹× ºÐ¼®ÀÌ °¡´É Çϵµ·Ï ¿ÀǼҽº ±â¹ÝÀÇ °Ë»ö¿£Áø ½Ã½ºÅÛ°ú ¿¬µ¿ÇÒ ¼ö ÀÖ´Â ¹æ¾ÈÀ» Á¦½ÃÇÏ°íÀÚ ÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
System administrator or security managers need to collect logs of computing device (desktop or server), which are used for the purpose of cause-analysis of security incident and discover if damage to system was either caused by hacking or computer virus. Furthermore, appropriate log maintenance helps preventing security breech incidents through identification of vulnerability. In addition, it can be utilized for prevention of data leakage through the insider. In the paper, we present log collection system developed using open source supported by commands and basic methods of Windows. Furthermore, we aim to collect log information to enable search and analysis from diverse perspectives and to propose a way to integrate with open source-based search engine system.
Å°¿öµå(Keyword) À©µµ¿ì ·Î±×   ·Î±× ¼öÁý   ·Î±× ºÐ¼®   Æ÷·»½Ä   ¿ÀǼҽº   log collection system   log analysis system   logstash   elasticsearch   forensic   open source  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå