• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) À¥½© ¼öÁý ¹× ºÐ¼®À» ÅëÇÑ ¸Ó½Å·¯´×±â¹Ý ¹æ¾î½Ã½ºÅÛ Á¦¾È ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) A study on machine learning-based defense system proposal through web shell collection and analysis
ÀúÀÚ(Author) °­¹Î±¸   Min-goo Kang   °­½ÂÁÖ   õÁö¿µ   ³ë°ÇÅ   Á¤ÀÍ·¡   Seung Ju Kang   Ji Young Chun   Geontae Noh   Ik Rae Jeong   ±è±âȯ   ½Å¿ëÅ   Ki-hwan Kim   Yong-tae Shin  
¿ø¹®¼ö·Ïó(Citation) VOL 23 NO. 04 PP. 0087 ~ 0094 (2022. 08)
Çѱ۳»¿ë
(Korean Abstract)
ÃÖ±Ù Á¤º¸Åë½Å ÀÎÇÁ¶óÀÇ ¹ß´Þ·Î ÀÎÅͳÝÁ¢¼Ó µð¹ÙÀ̽º°¡ ±Þ¼ÓÇÏ°Ô ´Ã¾î³ª°í ÀÖ´Â ½ÇÁ¤ÀÌ´Ù. ½º¸¶Æ®Æù, ³ëÆ®ºÏ, ÄÄÇ»ÅÍ, IoTµð¹ÙÀ̽º±îÁö ÀÎÅͳÝÁ¢¼ÓÀ» ÅëÇÏ¿© Á¤º¸Åë½Å¼­ºñ½º¸¦ ¹Þ°í ÀÖ´Â °ÍÀÌ´Ù. µð¹ÙÀ̽º ¿î¿µÈ¯°æÀÌ ´ëºÎºÐÀÌ À¥(WEB)À¸·Î ÀÌ·ç¾îÁ® ÀÖ´Â °ü°è·Î À¥½©À» ÀÌ¿ëÇÑ À¥»çÀ̹ö °ø°Ý¿¡ Ãë¾àÇÏ´Ù. À¥½©ÀÌ À¥ ¼­¹ö¿¡ ¾÷·Îµå µÉ °æ¿ì À¥ ¼­¹öÀÇ Á¦¾î°¡ ¼Õ½±°Ô ÀÌ·ç¾î Áú ¼ö À־ °ø°Ýºóµµ°¡ ³ôÀº °ÍÀ¸·Î È®ÀεȴÙ. À¥½©·Î ÀÎÇÑ ÇÇÇØ°¡ ¸¹ÀÌ ¹ß»ýÇϸ鼭 °¢ ±â¾÷¿¡¼­´Â ħÀÔÂ÷´Ü½Ã½ºÅÛ, ¹æÈ­º®, À¥¹æÈ­º®µî ´Ù¾çÇÑ º¸¾È Àåºñ·Î °ø°Ý¿¡ ´ëÀÀÇÏ°í ÀÖÁö¸¸, ÇöÀç Ãâ½ÃµÇ´Â ´ëºÎºÐÀÇ À¥½© ´ëÀÀ Àåºñ´Â ÆÐÅÏ ±â¹ÝÀ¸·Î ŽÁö°¡ ÀÌ·ç¾îÁö±â ¶§¹®¿¡ À¥½© º¯Á¾¿¡ À־´Â ŽÁö°¡ ¾î·Á¿ì¸ç ÀÌ·± Ư¼ºÀ¸·Î À¥½© °ø°ÝÀÇ ¿¹¹æ ¹× ´ëóÇϱâ À§Çؼ­´Â ±âÁ¸ÀÇ Ã¼°è¿Í º¸¾È¼ÒÇÁÆ®¿þ¾î¸¸ °¡Áö°í ´ëÀÀ Çϱ⿡´Â Èûµç »óȲÀÌ Çö½ÇÀÌ´Ù. ÀÌ¿¡ ÀΰøÁö´É ¸Ó½Å·¯´× °ú µö·¯´×±â¹ýÀ» È°¿ëÇÏ¿© ¾Ë·ÁÁöÁö ¾ÊÀº À¥½©À» »çÀü¿¡ ŽÁöÇÏ´Â µî ½Å±Ô »çÀ̹ö °ø°Ý¿¡ ´ëÇÏ¿© ´ëó ÇÒ ¼ö ÀÖ´Â ÀΰøÁö´É ¸Ó½Å·¯´× ±â¹ÝÀÇ À¥½© ¼öÁý ¹× ºÐ¼®À» ÅëÇÏ¿© ÀÚµ¿È­µÈ À¥½© ¹æ¾î½Ã½ºÅÛ¿¡ ´ëÇÏ¿© Á¦¾ÈÇÏ°íÀÚ ÇÑ´Ù. º» ³í¹®¿¡¼­ Á¦¾ÈÇÏ´Â ¸Ó½Ã·¯´×±â¹Ý À¥½© ¹æ¾î½Ã½ºÅÛ ¸ðµ¨Àº À¥È¯°æ¿¡ ´ëÇÑ »çÀ̹ö°ø°ÝÁßÀÇ ÇϳªÀÎ ¾Ç¼º À¥½©¿¡ ´ëÇÏ¿© ¼öÁý, ºÐ¼®, ŽÁö¸¦ ºü¸£°Ô ÇÏ¿©,¾ÈÀüÇÑ ÀÎÅͳÝȯ°æ±¸Ãà ¹× ¿î¿µ½Ã ÇʼöÀûÀ¸·Î Àû¿ëÀÌ ÇÊ¿äÇÑ À¥Á¤º¸º¸¾È ½Ã½ºÅÛ ¼³°è,±¸Ãà¿¡ ¸¹Àº µµ¿òÀÌ µÉ °ÍÀ¸·Î »ý°¢ÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.
Å°¿öµå(Keyword) ¾ÏÈ£ ¾ø´Â º¸¾È   º¹ÇÕÀÎÀÚÀÎÁõ(MFA)   Á¦·Î Æ®·¯½ºÆ®   FIDO °Å·¡   2Â÷ »ç¿ëÀÚ ÀÎÁõ   Passwordless security   Multi-Factor Authentication(MFA)   zero trust   FIDO transaction   Secondary user authentication   ¿¬ÇÕÇнÀ   ÃÖÀûÈ­   °¡ÁßÄ¡ ¸ðµ¨   Åë½Å½Ã°£   ÇÁ¶óÀ̹ö½Ã   ADMM   Federated learning   Optimization   Weight model   Communication time   Privacy   ADMM   À¥¼­ºñ½º   À¥½©°ø°Ý   ¸Ó½Å·¯´×   À¥½©¼öÁý ¹× ºÐ¼®   ¹æ¾î½Ã½ºÅÛ   WebShell collection and analysis   Defense System   Web service   WebShell attack   Machine learning  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå