이동에이전트를 이용한 침입탐지 모델의 제안
The computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion detection system has been an active research area to reduce the risk from intruders. A number of advantages of using m...
Saved in:
| Published in | 韓國컴퓨터情報學會論文誌 Vol. 9; no. 1; pp. 55 - 62 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | Korean |
| Published |
한국컴퓨터정보학회
2004
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1598-849X 2383-9945 |
Cover
| Abstract | The computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion detection system has been an active research area to reduce the risk from intruders. A number of advantages of using mobile agent computing paradigms have been Proposed. These advantages include : overcoming network latency, reducing network load, executing asynchronously and autonomously, adapting dynamically, and operating in heterogeneous environments. Many information security models have been proposed to mitigate agent-to-agent. agent-to-platform, and platform-to-agent element risks . In these paper, We have an object which is that through intrusion detection system development, the mobile agent is managed and through the analysis of performance data. the best environment is served. 컴퓨터네트워크의 확대와 인터넷 이용자의 증가에 따른 부작용으로 컴퓨터 보안 문제가 중요하게 대두되고 있다. 따라서 침입자들로부터 위험을 줄이기 위한 침입 탐지 시스템에 관한 연구가 활발하다. 이동에이전트를 이용하는 제안된 컴퓨팅 패러다임의 잇점은 네트워크의 지연시간 극복. 네트워크 부하 감소, 비동기적이고 자율적인 실행, 동적인 적합성과 이기종 환경에서의 운영이다. 많은 정보 보호 모델들은 agent-to-agent, agent-to-platform, 그리고 platform-to-agent 위험한 요소들을 완화하기 위하여 제안되었다. 본 논문에서는 침입 탐지 시스템의 개발을 통해서 이동 에이전트의 성능을 분석하여 관리함으로써 데이터가 최상의 환경을 유지하도록 하였다. |
|---|---|
| AbstractList | 컴퓨터네트워크의 확대와 인터넷 이용자의 증가에 따른 부작용으로 컴퓨터 보안 문제가 중요하게 대두되고 있다. 따라서 침입자들로부터 위험을 줄이기 위한 침입 탐지 시스템에 관한 연구가 활발하다. 이동에이전트를 이용하는 제안된 컴퓨팅 패러다임의 잇점은 네트워크의 지연시간 극복, 네트워크 부하 감소, 비동기적이고 자율적인 실행, 동적인 적합성과 이기종 환경에서의 운영이다. 많은 정보 보호 모델들은 agent-to-agent, agent-to-platform, 그리고 platform-to-agent 위험한 요소들을 완화하기 위하여 제안되었다. 본 논문에서는 침입 탐지 시스템의 개발을 통해서 이동 에이전트의 성능을 분석하여 관리함으로써 데이터가 최상의 환경을 유지하도록 하였다. The computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion detection system has been an active research area to reduce the risk from intruders. A number of advantages of using mobile agent computing paradigms have been proposed. These advantages include: overcoming network latency, reducing network load, executing asynchronously and autonomously, adapting dynamically, and operating in heterogeneous environments. Many information security models have been proposed to mitigate agent-to-agent, agent-to-platform, and platform-to-agent element risks. In these paper, We have an object which is that through intrusion detection system development, the mobile agent is managed and through the analysis of performance data, the best environment is served. KCI Citation Count: 0 The computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion detection system has been an active research area to reduce the risk from intruders. A number of advantages of using mobile agent computing paradigms have been Proposed. These advantages include : overcoming network latency, reducing network load, executing asynchronously and autonomously, adapting dynamically, and operating in heterogeneous environments. Many information security models have been proposed to mitigate agent-to-agent. agent-to-platform, and platform-to-agent element risks . In these paper, We have an object which is that through intrusion detection system development, the mobile agent is managed and through the analysis of performance data. the best environment is served. 컴퓨터네트워크의 확대와 인터넷 이용자의 증가에 따른 부작용으로 컴퓨터 보안 문제가 중요하게 대두되고 있다. 따라서 침입자들로부터 위험을 줄이기 위한 침입 탐지 시스템에 관한 연구가 활발하다. 이동에이전트를 이용하는 제안된 컴퓨팅 패러다임의 잇점은 네트워크의 지연시간 극복. 네트워크 부하 감소, 비동기적이고 자율적인 실행, 동적인 적합성과 이기종 환경에서의 운영이다. 많은 정보 보호 모델들은 agent-to-agent, agent-to-platform, 그리고 platform-to-agent 위험한 요소들을 완화하기 위하여 제안되었다. 본 논문에서는 침입 탐지 시스템의 개발을 통해서 이동 에이전트의 성능을 분석하여 관리함으로써 데이터가 최상의 환경을 유지하도록 하였다. |
| Author | 박경우(Kyung-Woo Park) 황인선(In-Sun Hwang) |
| Author_xml | – sequence: 1 fullname: 황인선(In-Sun Hwang) – sequence: 2 fullname: 박경우(Kyung-Woo Park) |
| BackLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART000929270$$DAccess content in National Research Foundation of Korea (NRF) |
| BookMark | eNpFjctKw0AYhQepYK19h2zEVSBzyWT-hYtSq1aLBangbpg0iYTUVBJduBOqIILYTfFCK92I1bWLCr5Rpu9gtIKr8x34OGcZFeJu7C-gIqGCmgDMLqAitkGYgsHhEiqnaehalBMHiM2LaF2PPrK7R33fz0GPL2c30-zly_gpT2-zwdDQnxP9fDXr9fXrhZG9T7LbqR49GHo81IPrFbQYqE7ql_-yhA42a63qttlobtWrlYYZYczAdAgDxgUHsNqB7XlgQ8Bd1_IIASwY8YRwmLIFKOUzSjhzsALLpQIDVY6naAmtzXfjJJBRO5RdFf7mUVdGiazst-pSAMckN1fnZhSmp6GMvbQjdyq7TWJZDGPIDx3KOf_34rMkPPa9UMmTHFRyLveaGzWL25RjAfQbMUlx4A |
| ContentType | Journal Article |
| DBID | DBRKI TDB JDI ACYCR |
| DEWEY | 651.8 |
| DatabaseName | DBPIA - 디비피아 Nurimedia DBPIA Journals KoreaScience Korean Citation Index |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Business |
| DocumentTitleAlternate | Proposed of Intrusion detdction model using the Mobile agent |
| DocumentTitle_FL | Proposed of Intrusion detection model using the Mobile agent |
| EISSN | 2383-9945 |
| EndPage | 62 |
| ExternalDocumentID | oai_kci_go_kr_ARTI_89612 JAKO200411922973666 NODE06536189 |
| GroupedDBID | .UV ALMA_UNASSIGNED_HOLDINGS DBRKI TDB JDI ACYCR M~E |
| ID | FETCH-LOGICAL-k1149-72494686990cf5dd959f6bb0d2291842d8874a589aae4326471a90b38193a7da3 |
| ISSN | 1598-849X |
| IngestDate | Tue Nov 21 21:44:45 EST 2023 Fri Dec 22 11:59:38 EST 2023 Thu Feb 06 13:16:53 EST 2025 |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | false |
| Issue | 1 |
| Keywords | intrusion detection packet mobile agent raw data |
| Language | Korean |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-k1149-72494686990cf5dd959f6bb0d2291842d8874a589aae4326471a90b38193a7da3 |
| Notes | KISTI1.1003/JNL.JAKO200411922973666 G704-001619.2004.9.1.009 |
| OpenAccessLink | http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO200411922973666&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01 |
| PageCount | 8 |
| ParticipantIDs | nrf_kci_oai_kci_go_kr_ARTI_89612 kisti_ndsl_JAKO200411922973666 nurimedia_primary_NODE06536189 |
| PublicationCentury | 2000 |
| PublicationDate | 2004 |
| PublicationDateYYYYMMDD | 2004-01-01 |
| PublicationDate_xml | – year: 2004 text: 2004 |
| PublicationDecade | 2000 |
| PublicationTitle | 韓國컴퓨터情報學會論文誌 |
| PublicationTitleAlternate | Journal of the Korea Society of Computer and Information |
| PublicationYear | 2004 |
| Publisher | 한국컴퓨터정보학회 |
| Publisher_xml | – name: 한국컴퓨터정보학회 |
| SSID | ssib036279256 ssib001107257 ssib044738270 ssib012146333 ssib008451689 ssib053377514 |
| Score | 1.3339766 |
| Snippet | The computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of... 컴퓨터네트워크의 확대와 인터넷 이용자의 증가에 따른 부작용으로 컴퓨터 보안 문제가 중요하게 대두되고 있다. 따라서 침입자들로부터 위험을 줄이기 위한 침입 탐지... |
| SourceID | nrf kisti nurimedia |
| SourceType | Open Website Open Access Repository Publisher |
| StartPage | 55 |
| SubjectTerms | 컴퓨터학 |
| Title | 이동에이전트를 이용한 침입탐지 모델의 제안 |
| URI | https://www.dbpia.co.kr/journal/articleDetail?nodeId=NODE06536189 http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO200411922973666&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART000929270 |
| Volume | 9 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| ispartofPNX | 한국컴퓨터정보학회논문지, 2004, 9(1), , pp.55-62 |
| journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2383-9945 dateEnd: 99991231 omitProxy: true ssIdentifier: ssib044738270 issn: 1598-849X databaseCode: M~E dateStart: 19960101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3Na9RAFA-1F72IomL9KDk4pyWSzcwk8w4eJh-lVtpeWugt5GulrOxKbS8eRFBBBLGX4get9CJWzx4q-B9t-j_4ZpLdZEXxAy9hdmb4vTfzsvt-bzZ5zzBuIMmgRe6CZae5a7FcZJbgLrM8N3WyLmU00Ulcl1fcxXW2tME3Zk7R1lNLO9vpzezhT98r-RerYh_aVb0l-xeWnYBiB7bRvnhFC-P1j2xMooBASHxGIp-IBQKgezwCdmsoINImAhshEZL4Qk2WnPhBZ2oSSCJBTQJOoBrzgUihxyIiuAagNbb0iLA7GkrqSahAqME1JIhOLRgC3cVJVVdvTIQngkiEOnEiQy3Q18rgENWgodLbt8dQXInx6XgO1wsOleYi0BqoVWmdgloVraa6jUAlpGode2ikChLlO8QP6z3w7WZKqARIGG-TRkSFpD11VtKckv73RbVdBghLMF0QGD2q7kMeRC0AxluuocpGXJOM2gNNpf_-wS1PJQDvZ5vx3WHc34oxzLkdC3B1ZW1kl-rAYflR1FBgjOed1j_ZQlVibioKdFUhd9pQfOQvHjhNPiXGPCocXWNxsjCM21Qws4n0a7CFrO30YEeVnsDfrxYVWztnnK1jKFNWX4jzxkx_eMG4VR58Gb16W77exUZ5-PTkxfHowzdTfXj36WRv3yy_HpXvn5082S0_PjZHn49GL4_Lgzdmebhf7j2_aKwvRGvBolXXBrH6GMGD5TkMmCtcJFNZj-c5cOi5aWrnjgNdwZwcnSdLuIAkKRiGKMjBErBTdT5BEy9P6CVjdjAcFJcNE2wvcVhSFF5BWZZSSJPC41nXtnvo4Hg2Z8zr5ceD_MG9eEneWVW3VhdDI1X3DcP_OcPEfdE2-pWtEGOyafH9Ko9MvLIaRio1tNsVcOX3GFeNM9VjY-r875oxu721U1xHRrydzutb4DsBnYux |
| linkProvider | ISSN International Centre |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%EC%9D%B4%EB%8F%99%EC%97%90%EC%9D%B4%EC%A0%84%ED%8A%B8%EB%A5%BC+%EC%9D%B4%EC%9A%A9%ED%95%9C+%EC%B9%A8%EC%9E%85%ED%83%90%EC%A7%80+%EB%AA%A8%EB%8D%B8%EC%9D%98+%EC%A0%9C%EC%95%88&rft.jtitle=%ED%95%9C%EA%B5%AD%EC%BB%B4%ED%93%A8%ED%84%B0%EC%A0%95%EB%B3%B4%ED%95%99%ED%9A%8C%EB%85%BC%EB%AC%B8%EC%A7%80%2C+9%281%29&rft.au=%EB%B0%95%EA%B2%BD%EC%9A%B0&rft.au=%ED%99%A9%EC%9D%B8%EC%84%A0&rft.date=2004&rft.pub=%ED%95%9C%EA%B5%AD%EC%BB%B4%ED%93%A8%ED%84%B0%EC%A0%95%EB%B3%B4%ED%95%99%ED%9A%8C&rft.issn=1598-849X&rft.eissn=2383-9945&rft.spage=55&rft.epage=62&rft.externalDBID=n%2Fa&rft.externalDocID=oai_kci_go_kr_ARTI_89612 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1598-849X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1598-849X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1598-849X&client=summon |