최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.30 no.6, 2020년, pp.1087 - 1101
김태용 (한국과학기술정보연구원) , 권태웅 (한국과학기술정보연구원) , 이준 (한국과학기술정보연구원) , 이윤수 (한국과학기술정보연구원) , 송중석 (한국과학기술정보연구원)
Various security devices are used to protect internal networks and valuable information from rapidly evolving cyber attacks. Firewall, which is the most commonly used security device, tries to prevent malicious attacks based on a text-based filtering rule (i.e., access control policy), by allowing o...
Michael Cooney, "Network World 2020 State of the Network: SD-WAN, edge networking and security are hot", NetworkWorld, 14 Apr. 2020, IDG Communications, Inc. https://www.networkworld.com/article/3537559/state-of-the-network-sd-wan-edge-networking-and-security-issues-heat-things-up.html, Accessed 18 June 2020.
W. Stallings, "Network security essentials: applications and standards.", pp. 374-397, 2016.
E. S. Al-Shaer and H. H. Hamed, "Modeling and management of firewall policies." IEEE Transactions on network and service management 1.1, pp. 2-10, 2004.
T. Tran and E. S. Al-Shaer, R. Boutaba, "PolicyVis: Firewall Security Policy Visualization and Inspection." LISA. Vol. 7. pp. 1-16, Nov. 2007.
E. S. Al-Shaer and H. H. Hamed, "Firewall policy advisor for anomaly discovery and rule editing." International Symposium on Integrated Network Management. Springer, Boston, pp. 17-30, Mar, 2003.
A. K. Meena and N. Hubballi, "NViZ: An Interactive Visualization of Network Security Systems Logs." 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, pp. 685-687, Jan, 2020.
Ui-Hyong Kim and Jung-Min Kang, Jae-Sung Lee, Hyong-Shik Kim, Soon-Young Jung, "Practical firewall policy inspection using anomaly detection and its visualization." Multimedia tools and applications 71.2, pp. 627-641, 2014.
F. Mansmann and T. Gobel, W. Cheswick, "Visual analysis of complex firewall configurations." Proceedings of the ninth international symposium on visualization for cyber security, pp. 1-8, 2012.
A. Wool, "Trends in firewall configuration errors: Measuring the holes in swiss cheese." IEEE Internet Computing 14.4, pp. 58-65, 2010.
K. Ingham and S. Forrest, "A history and survey of network firewalls." University of New Mexico, Tech. Rep, 2002.
Y. Bartal and A. Mayer, K. Nissim, A. Wool, "Firmato: A novel firewall management toolkit." Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No. 99CB36344). IEEE, pp. 17-31, May, 1999.
Q. Duan, and E. S. Al-Shaer, "Traffic-aware dynamic firewall policy management: techniques and applications." IEEE Communications Magazine 51.7, pp. 73-79, 2013.
H. Hu and G. J. Ahn, K. Kulkarni, "Detecting and resolving firewall policy anomalies." IEEE Transactions on dependable and secure computing 9.3, pp. 318-331, 2012.
Paloalto Networks, PA-Series user manual, https://www.paloaltonetworks.co.kr/network-security/pa-series, Ac cessed 21 June 2020.
AhnLab, TrusGuard Firewalls, https://www.ahnlab.com/kr/site/product/productView.do?prodSeq10, Accessed 24 June 2020.
Apache Tomcat, Tomcat 7.0.104 Software, http://tomcat.apache.org/, Accessed 23 June 2020.
MariaDB Foundation, MariaDB 10.3, https://mariadb.org/, Accessed 23 June 2020.
Redislabs, redis 6.0, https://redis.io/, Accessed 23 June 2020.
Unity Techinologies, Unity Core Platform, https://unity.com/, Accessed 23 June 2020.
Likert, Rensis. "A technique for the measurement of attitudes." Archives of psychology (1932).
SECUI, SECUI MF2, https://www.secui.com/product/mf2/, Accessed 25 June 2020.
Wins, Sniper NGFW, http://www.wins21.co.kr/product/product_030101.html?num28/, Accessed 25 June 2020.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.