15 research outputs found
Identifying multiple selection biases and treatment effects under general conditions
Thesis (master`s)--서울대학교 대학원 :경제학부 경제학 전공,2001.Maste
Automated Verification Methodology of Security Events Based on Heuristic Analysis
We present an automated verification methodology of the security events, that is, IDS alerts, based on heuristic analysis. The proposed verification methodology aims to automatically identify real cyberattacks from the security events and filter out false positive, so that the security analyst is able to conduct security monitoring and response more effectively. For the proposed verification methodology, we used the 1,528,730,667 security events that were obtained from Science and Technology Security Center (S&T-SEC). We then extracted the core security events that were caused by the real cyberattacks. Among the core security events, we selected the top 20 types of the security events in the number of the real attacks that they raised. By analyzing the top 20 types of the security events, we discovered essential elements and optional elements for using in the automated verification of the security events. The evaluation results showed that the proposed verification methodology could contribute to the reduction (about 67%) of the meaningless security events. Furthermore, we demonstrated that the proposed verification methodology contributed to the detection of 140 true negatives that were not identified by the security analyst and the total accuracy of the proposed verification methodology was 96.1
The Development of Visualization Engine to detect abnormal activity related to New-type Cyber Threat
Science and Technology Information Security
funder : 교육과학기술부agency : 한국과학기술정보연구원agency : Korea Institute of Science and Technology InformationⅠ. 연구목표 및 내용
본 연구는 공공 목적의 연구로서 첨예화 • 지능화되는 사이버 침해위협으로
부터 국가 과학기술분야의 핵심 연구정보자원을 보호하고자하는 목표를 달성하
기 위하여, 정보보호 대상기관의 침해사고 피해를 최소화하고 사전예방 능력
을 강화하는 전주기적 보호 활동을 수행하였다.
본 연구에서 수행한 연구 내용은 아래와 같다.
○ 과학기술 정보보호 기반 구축 및 활용
- 24시간 365일 “Non-Stop” 체제구축을 통한 상황관제・분석 및 침해공격 대응지원
○ 안정적 과학기술 정보보호 기술연구・적용
- 과학기술 분야 정보보호 기반 안정화를 위한 침해공격시도 자동화 탐지 유형 기술연구
○ 정보보호 기술정보 공유 및 서비스 활성화
- 웹 기반 사용자 애로지원 및 정보보호 기술 공유 활성화를 통한 수혜 기관 정보보호 역량 강화Ⅰ. The Goal and Contents of this Research
The goal of this research is to protect core research information resources of national science and technology field from cyber intrusion threats such as worms, viruses and hacking. To achieve this goal, we performed periodical security activities for intrusion incident prevention and damage minimization of the organizations by operating "Science and Technology Information Security Center".
The contents of this research are as follows.
○ Utilization of S&T-SEC infrastructure
- Establishment of 24 hour and 365 days "Non-Stop" system for monitoring, analysis and response support against intrusion threats
○ Research and application on technologies for stable S&T-SEC
- Research on technologies of automatic detection patterns for stabilization of S&T-SEC infrastructure
○ Activation of system for S&T-SEC collaboration and service
- Web-based user support and Reinforcement of information security of S&T-SEC organizations through activation of sharing technologies for information security
Science and Technology Information Security
funder : 미래창조과학부funder : KAagency : 한국과학기술정보연구원agency : Korea Institute of Science and Technology Information○ 본 연구사업은 국가 과학기술분야 핵심 연구정보자원을 웜・바이러스 및 해킹 등의 사이버 침해위협으로부터 보호하여 안전한 연구 환경을 조성하기 위하여 추진되었음
○ 과학기술사이버안전센터의 전주기적 보호활동을 통한 대상기관 침해사고 피해 최소화 및 사전 예방을 위하여 침해위협관리시스템 및 종합정보분석시스템 등 정보보호 기반을 활용하여 24시간 실시간 상황관제 활동, 과학기술분야 맞춤형 정보보호 기술에 대한 지속적 연구 및 정보보호 기술공유와 정보보호 커뮤니티 활동을 적극적으로 수행하였음
○ 과학기술분야에 적합한 정보보호 활동을 수행하기 위하여 신규 침해공격시도를 탐지하기 위한 네트워크 분석 및 탐지패턴 개발, 상황관제시스템의 성능개선 등을 지속적으로 추진하여 과학기술사이버안전센터의 기술력을 향상시켰음
○ 연구사업 수행결과는 과학기술 분야 정보보호를 위한 일원화된 체계 구축을 통한 관제 체제의 효율성 향상 및 중요 연구정보자원 이용자에 대한 안전한 연구 환경 제공에 기여하였으며, 핵심연구정보 자원에 대한 해킹으로 유발될 수 있는 막대한 경제적 손실을 최소화하고 안정성을 확보하여 국가 경쟁력 향상에 기여할 것으로 기대됨Ⅲ. The Contents and Results of Operation of this Research
To protect core research information resources of national science and technology field, S&T-SEC have actively performed periodical security activities with 24-hour real-time situation monitoring utilizing the information security infrastructure, such as situation monitoring system, research on information security technologies appropriated for science & technology, and sharing of information security technologies.
Through this operation of our research, we are contributing to minimize the damage of cyber emergency and to prevent spread of intrusion threats in the nationally critical situation as 「3.20 infection of computer systems of broadcasters and financial institutions」. Also, we are improving technical skill of "S&T-SEC" by continually promoting the development of detecting pattern for new harmful traffic and the performance improvement of security monitoring system
