이동에이전트를 이용한 침입탐지 모델의 제안

The computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion detection system has been an active research area to reduce the risk from intruders. A number of advantages of using m...

Full description

Saved in:
Bibliographic Details
Published in韓國컴퓨터情報學會論文誌 Vol. 9; no. 1; pp. 55 - 62
Main Authors 황인선(In-Sun Hwang), 박경우(Kyung-Woo Park)
Format Journal Article
LanguageKorean
Published 한국컴퓨터정보학회 2004
Subjects
Online AccessGet full text
ISSN1598-849X
2383-9945

Cover

Abstract The computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion detection system has been an active research area to reduce the risk from intruders. A number of advantages of using mobile agent computing paradigms have been Proposed. These advantages include : overcoming network latency, reducing network load, executing asynchronously and autonomously, adapting dynamically, and operating in heterogeneous environments. Many information security models have been proposed to mitigate agent-to-agent. agent-to-platform, and platform-to-agent element risks . In these paper, We have an object which is that through intrusion detection system development, the mobile agent is managed and through the analysis of performance data. the best environment is served. 컴퓨터네트워크의 확대와 인터넷 이용자의 증가에 따른 부작용으로 컴퓨터 보안 문제가 중요하게 대두되고 있다. 따라서 침입자들로부터 위험을 줄이기 위한 침입 탐지 시스템에 관한 연구가 활발하다. 이동에이전트를 이용하는 제안된 컴퓨팅 패러다임의 잇점은 네트워크의 지연시간 극복. 네트워크 부하 감소, 비동기적이고 자율적인 실행, 동적인 적합성과 이기종 환경에서의 운영이다. 많은 정보 보호 모델들은 agent-to-agent, agent-to-platform, 그리고 platform-to-agent 위험한 요소들을 완화하기 위하여 제안되었다. 본 논문에서는 침입 탐지 시스템의 개발을 통해서 이동 에이전트의 성능을 분석하여 관리함으로써 데이터가 최상의 환경을 유지하도록 하였다.
AbstractList 컴퓨터네트워크의 확대와 인터넷 이용자의 증가에 따른 부작용으로 컴퓨터 보안 문제가 중요하게 대두되고 있다. 따라서 침입자들로부터 위험을 줄이기 위한 침입 탐지 시스템에 관한 연구가 활발하다. 이동에이전트를 이용하는 제안된 컴퓨팅 패러다임의 잇점은 네트워크의 지연시간 극복, 네트워크 부하 감소, 비동기적이고 자율적인 실행, 동적인 적합성과 이기종 환경에서의 운영이다. 많은 정보 보호 모델들은 agent-to-agent, agent-to-platform, 그리고 platform-to-agent 위험한 요소들을 완화하기 위하여 제안되었다. 본 논문에서는 침입 탐지 시스템의 개발을 통해서 이동 에이전트의 성능을 분석하여 관리함으로써 데이터가 최상의 환경을 유지하도록 하였다. The computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion detection system has been an active research area to reduce the risk from intruders. A number of advantages of using mobile agent computing paradigms have been proposed. These advantages include: overcoming network latency, reducing network load, executing asynchronously and autonomously, adapting dynamically, and operating in heterogeneous environments. Many information security models have been proposed to mitigate agent-to-agent, agent-to-platform, and platform-to-agent element risks. In these paper, We have an object which is that through intrusion detection system development, the mobile agent is managed and through the analysis of performance data, the best environment is served. KCI Citation Count: 0
The computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion detection system has been an active research area to reduce the risk from intruders. A number of advantages of using mobile agent computing paradigms have been Proposed. These advantages include : overcoming network latency, reducing network load, executing asynchronously and autonomously, adapting dynamically, and operating in heterogeneous environments. Many information security models have been proposed to mitigate agent-to-agent. agent-to-platform, and platform-to-agent element risks . In these paper, We have an object which is that through intrusion detection system development, the mobile agent is managed and through the analysis of performance data. the best environment is served. 컴퓨터네트워크의 확대와 인터넷 이용자의 증가에 따른 부작용으로 컴퓨터 보안 문제가 중요하게 대두되고 있다. 따라서 침입자들로부터 위험을 줄이기 위한 침입 탐지 시스템에 관한 연구가 활발하다. 이동에이전트를 이용하는 제안된 컴퓨팅 패러다임의 잇점은 네트워크의 지연시간 극복. 네트워크 부하 감소, 비동기적이고 자율적인 실행, 동적인 적합성과 이기종 환경에서의 운영이다. 많은 정보 보호 모델들은 agent-to-agent, agent-to-platform, 그리고 platform-to-agent 위험한 요소들을 완화하기 위하여 제안되었다. 본 논문에서는 침입 탐지 시스템의 개발을 통해서 이동 에이전트의 성능을 분석하여 관리함으로써 데이터가 최상의 환경을 유지하도록 하였다.
Author 박경우(Kyung-Woo Park)
황인선(In-Sun Hwang)
Author_xml – sequence: 1
  fullname: 황인선(In-Sun Hwang)
– sequence: 2
  fullname: 박경우(Kyung-Woo Park)
BackLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART000929270$$DAccess content in National Research Foundation of Korea (NRF)
BookMark eNpFjctKw0AYhQepYK19h2zEVSBzyWT-hYtSq1aLBangbpg0iYTUVBJduBOqIILYTfFCK92I1bWLCr5Rpu9gtIKr8x34OGcZFeJu7C-gIqGCmgDMLqAitkGYgsHhEiqnaehalBMHiM2LaF2PPrK7R33fz0GPL2c30-zly_gpT2-zwdDQnxP9fDXr9fXrhZG9T7LbqR49GHo81IPrFbQYqE7ql_-yhA42a63qttlobtWrlYYZYczAdAgDxgUHsNqB7XlgQ8Bd1_IIASwY8YRwmLIFKOUzSjhzsALLpQIDVY6naAmtzXfjJJBRO5RdFf7mUVdGiazst-pSAMckN1fnZhSmp6GMvbQjdyq7TWJZDGPIDx3KOf_34rMkPPa9UMmTHFRyLveaGzWL25RjAfQbMUlx4A
ContentType Journal Article
DBID DBRKI
TDB
JDI
ACYCR
DEWEY 651.8
DatabaseName DBPIA - 디비피아
Nurimedia DBPIA Journals
KoreaScience
Korean Citation Index
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Business
DocumentTitleAlternate Proposed of Intrusion detdction model using the Mobile agent
DocumentTitle_FL Proposed of Intrusion detection model using the Mobile agent
EISSN 2383-9945
EndPage 62
ExternalDocumentID oai_kci_go_kr_ARTI_89612
JAKO200411922973666
NODE06536189
GroupedDBID .UV
ALMA_UNASSIGNED_HOLDINGS
DBRKI
TDB
JDI
ACYCR
M~E
ID FETCH-LOGICAL-k1149-72494686990cf5dd959f6bb0d2291842d8874a589aae4326471a90b38193a7da3
ISSN 1598-849X
IngestDate Tue Nov 21 21:44:45 EST 2023
Fri Dec 22 11:59:38 EST 2023
Thu Feb 06 13:16:53 EST 2025
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Issue 1
Keywords intrusion detection
packet
mobile agent
raw data
Language Korean
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-k1149-72494686990cf5dd959f6bb0d2291842d8874a589aae4326471a90b38193a7da3
Notes KISTI1.1003/JNL.JAKO200411922973666
G704-001619.2004.9.1.009
OpenAccessLink http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO200411922973666&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01
PageCount 8
ParticipantIDs nrf_kci_oai_kci_go_kr_ARTI_89612
kisti_ndsl_JAKO200411922973666
nurimedia_primary_NODE06536189
PublicationCentury 2000
PublicationDate 2004
PublicationDateYYYYMMDD 2004-01-01
PublicationDate_xml – year: 2004
  text: 2004
PublicationDecade 2000
PublicationTitle 韓國컴퓨터情報學會論文誌
PublicationTitleAlternate Journal of the Korea Society of Computer and Information
PublicationYear 2004
Publisher 한국컴퓨터정보학회
Publisher_xml – name: 한국컴퓨터정보학회
SSID ssib036279256
ssib001107257
ssib044738270
ssib012146333
ssib008451689
ssib053377514
Score 1.3339766
Snippet The computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of...
컴퓨터네트워크의 확대와 인터넷 이용자의 증가에 따른 부작용으로 컴퓨터 보안 문제가 중요하게 대두되고 있다. 따라서 침입자들로부터 위험을 줄이기 위한 침입 탐지...
SourceID nrf
kisti
nurimedia
SourceType Open Website
Open Access Repository
Publisher
StartPage 55
SubjectTerms 컴퓨터학
Title 이동에이전트를 이용한 침입탐지 모델의 제안
URI https://www.dbpia.co.kr/journal/articleDetail?nodeId=NODE06536189
http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO200411922973666&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01
https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART000929270
Volume 9
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
ispartofPNX 한국컴퓨터정보학회논문지, 2004, 9(1), , pp.55-62
journalDatabaseRights – providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2383-9945
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssib044738270
  issn: 1598-849X
  databaseCode: M~E
  dateStart: 19960101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3Na9RAFA-1F72IomL9KDk4pyWSzcwk8w4eJh-lVtpeWugt5GulrOxKbS8eRFBBBLGX4get9CJWzx4q-B9t-j_4ZpLdZEXxAy9hdmb4vTfzsvt-bzZ5zzBuIMmgRe6CZae5a7FcZJbgLrM8N3WyLmU00Ulcl1fcxXW2tME3Zk7R1lNLO9vpzezhT98r-RerYh_aVb0l-xeWnYBiB7bRvnhFC-P1j2xMooBASHxGIp-IBQKgezwCdmsoINImAhshEZL4Qk2WnPhBZ2oSSCJBTQJOoBrzgUihxyIiuAagNbb0iLA7GkrqSahAqME1JIhOLRgC3cVJVVdvTIQngkiEOnEiQy3Q18rgENWgodLbt8dQXInx6XgO1wsOleYi0BqoVWmdgloVraa6jUAlpGode2ikChLlO8QP6z3w7WZKqARIGG-TRkSFpD11VtKckv73RbVdBghLMF0QGD2q7kMeRC0AxluuocpGXJOM2gNNpf_-wS1PJQDvZ5vx3WHc34oxzLkdC3B1ZW1kl-rAYflR1FBgjOed1j_ZQlVibioKdFUhd9pQfOQvHjhNPiXGPCocXWNxsjCM21Qws4n0a7CFrO30YEeVnsDfrxYVWztnnK1jKFNWX4jzxkx_eMG4VR58Gb16W77exUZ5-PTkxfHowzdTfXj36WRv3yy_HpXvn5082S0_PjZHn49GL4_Lgzdmebhf7j2_aKwvRGvBolXXBrH6GMGD5TkMmCtcJFNZj-c5cOi5aWrnjgNdwZwcnSdLuIAkKRiGKMjBErBTdT5BEy9P6CVjdjAcFJcNE2wvcVhSFF5BWZZSSJPC41nXtnvo4Hg2Z8zr5ceD_MG9eEneWVW3VhdDI1X3DcP_OcPEfdE2-pWtEGOyafH9Ko9MvLIaRio1tNsVcOX3GFeNM9VjY-r875oxu721U1xHRrydzutb4DsBnYux
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%EC%9D%B4%EB%8F%99%EC%97%90%EC%9D%B4%EC%A0%84%ED%8A%B8%EB%A5%BC+%EC%9D%B4%EC%9A%A9%ED%95%9C+%EC%B9%A8%EC%9E%85%ED%83%90%EC%A7%80+%EB%AA%A8%EB%8D%B8%EC%9D%98+%EC%A0%9C%EC%95%88&rft.jtitle=%ED%95%9C%EA%B5%AD%EC%BB%B4%ED%93%A8%ED%84%B0%EC%A0%95%EB%B3%B4%ED%95%99%ED%9A%8C%EB%85%BC%EB%AC%B8%EC%A7%80%2C+9%281%29&rft.au=%EB%B0%95%EA%B2%BD%EC%9A%B0&rft.au=%ED%99%A9%EC%9D%B8%EC%84%A0&rft.date=2004&rft.pub=%ED%95%9C%EA%B5%AD%EC%BB%B4%ED%93%A8%ED%84%B0%EC%A0%95%EB%B3%B4%ED%95%99%ED%9A%8C&rft.issn=1598-849X&rft.eissn=2383-9945&rft.spage=55&rft.epage=62&rft.externalDBID=n%2Fa&rft.externalDocID=oai_kci_go_kr_ARTI_89612
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1598-849X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1598-849X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1598-849X&client=summon