Skip to main content
Top
Published in: Cluster Computing 2/2013

01-06-2013

A study on abnormal event correlation analysis for convergence security monitor

Authors: DongHwi Lee, Jeom Goo Kim, Kuinam J. Kim

Published in: Cluster Computing | Issue 2/2013

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recently, the leak of domestic core technology of major business in Korea and the subsequent damage, has been increasing every year. Financial losses due to this leak are estimated to be about 220 trillion, which is equivalent to the gross budget of Korea Besides. Currently, the paradigm of industrial security has been changed from simple installation of security equipment to efficient management and control market. Leakage of internal material is able to be prevented, blocked and tracking afterward innovatively through enterprise risk management and security control by fusion of physical security system (entrance control system, vision security system etc.) and IT integrated security control system. It can be possible to setup systematical converging security control process in short term by achieving an effect to running expert organization without additional investment for current physical security and IT security personnel, and it is needed to firmly setup the acquisition and integrated control of IT security and physical security, connected tracking control when security issue is happened, definition for terms of information leakage and security violation and real-time observation, rapid determination and reaction/corrective action for trial of security violation and information leakage, phased and systematic security policy by individual technology. The majority of the leaks are caused by former and current staff members, cooperated businesses, scientists and investment companies. This shows that the sources of the leaks are internal personnel. In this manner, we can infer that the management and plan of personnel security has not implemented sound practices to prevent technology leak by people. Therefore, this thesis suggests classifying methods of technology leak through clustering, one of the data mining methods about the information of internal personnel to prevent core technology leak from businesses.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lee, D., Lee, D., Kim, K.: Event types of threats in real-time design and implementation of formalized. J. Inf. Sec. (2006) Lee, D., Lee, D., Kim, K.: Event types of threats in real-time design and implementation of formalized. J. Inf. Sec. (2006)
2.
go back to reference Zou, C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for internet worms. In: Proceedings of the 10th ACM Conference on Computer and Communication Security, p. 10 (2003) Zou, C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for internet worms. In: Proceedings of the 10th ACM Conference on Computer and Communication Security, p. 10 (2003)
3.
go back to reference Cabrera, J.B.D., Lewis, L., Qin, X., Gutierrez, C., Lee, W., Mehra, R.K.: Proactive intrusion detection and SNMP based security management. In: Proceedings of IFIP/IEEE Eighth International Symposium on Integrated Net Work Management, pp. 225–254 (2003) Cabrera, J.B.D., Lewis, L., Qin, X., Gutierrez, C., Lee, W., Mehra, R.K.: Proactive intrusion detection and SNMP based security management. In: Proceedings of IFIP/IEEE Eighth International Symposium on Integrated Net Work Management, pp. 225–254 (2003)
4.
go back to reference Zhai, J., Tian, J., Du, R., Huang, J.: Network intrusion early warning model based on D-S evidence theory. In: Proceedings of 2003 International Conference on Machine Learning and Cybernetics, vol. 4, pp. 1972–1977 (2003) CrossRef Zhai, J., Tian, J., Du, R., Huang, J.: Network intrusion early warning model based on D-S evidence theory. In: Proceedings of 2003 International Conference on Machine Learning and Cybernetics, vol. 4, pp. 1972–1977 (2003) CrossRef
5.
go back to reference Li, J., Manikopoulos, C.: Early statistical anomaly intrusion detection of DOS attacks using MIB traffic parameters. In: IEEE Systems, Man and Cybernetics Society, Information Assurance Workshop, pp. 53–59 (2003) Li, J., Manikopoulos, C.: Early statistical anomaly intrusion detection of DOS attacks using MIB traffic parameters. In: IEEE Systems, Man and Cybernetics Society, Information Assurance Workshop, pp. 53–59 (2003)
6.
go back to reference Lee, K.-H., Lee, C.-K.: The research on establishment for leaking prevention system through the analysis of internal information symptoms. Information Protection Academy Paper, vol. 19, No. 3, June 2009 Lee, K.-H., Lee, C.-K.: The research on establishment for leaking prevention system through the analysis of internal information symptoms. Information Protection Academy Paper, vol. 19, No. 3, June 2009
7.
go back to reference Song, S.-K., Park, J.-S., Woo, J.-H., Lim, J.-I.: Research on the method for internal computing environment optimization to prevent information leaking. Information Protection Academy Paper, vol. 18, No. 6, Dec. 2008 Song, S.-K., Park, J.-S., Woo, J.-H., Lim, J.-I.: Research on the method for internal computing environment optimization to prevent information leaking. Information Protection Academy Paper, vol. 18, No. 6, Dec. 2008
8.
go back to reference Lee, D.-S., Kim, J.-S., Kim, K.: The trend of information leaking prevention technology. Information Protection Academy Paper, 20, No. 1, Feb. 2010 Lee, D.-S., Kim, J.-S., Kim, K.: The trend of information leaking prevention technology. Information Protection Academy Paper, 20, No. 1, Feb. 2010
Metadata
Title
A study on abnormal event correlation analysis for convergence security monitor
Authors
DongHwi Lee
Jeom Goo Kim
Kuinam J. Kim
Publication date
01-06-2013
Publisher
Springer US
Published in
Cluster Computing / Issue 2/2013
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-011-0191-6

Other articles of this Issue 2/2013

Cluster Computing 2/2013 Go to the issue

Premium Partner