14 research outputs found

    Snort Rule Recommendation Technique through Packet Log Analysis

    Get PDF
    Recently, as using of network service systems providing various services, such as FTP increases, attacks of hacker on them having vulnerabilities are increasing. Thus we need various security tools for detecting and preventing attacks. A IDS(Intrusion Detection System) being one of security tools detects external attacks by using rules for intrusion detection. Because applying whole of rules at a IDS consumes many resources and decrease speed of services, users of IDS need knowledge of security experts to properly configure rules at a IDS. To overcome these problems, this thesis proposes the system recommending Snort rules through packet log analysis. For this, firstly, the proposed system structures Snort rules and analyzes packet log generated from network service systems by using structured rule data. Secondly, the proposed system recommends proper rules based on the result of analysis. Finally, the proposed system applies recommended rules at Snort and removes them from Snort. The proposed system has an advantage of managing rules at Snort automatically and efficiently without knowledge of security experts.1์žฅ ์„œ ๋ก  1 2์žฅ ๊ด€๋ จ ์—ฐ๊ตฌ 3 2.1 ์นจ์ž… ํƒ์ง€ ์‹œ์Šคํ…œ 3 2.2 Snort 5 2.3 Snort ๊ทœ์น™ 6 3 ์žฅ Snore ๊ทœ์น™ ์ถ”์ฒœ ์‹œ์Šคํ…œ์˜ ์„ค๊ณ„ ๋ฐ ๊ตฌํ˜„ 13 3.1 Snort ๊ทœ์น™ ๊ตฌ์กฐํ™” ๋ชจ๋“ˆ 13 3.2 ํŒจํ‚ท ๋กœ๊ทธ ๋ถ„์„ ๋ชจ๋“ˆ 25 3.3 ๊ทœ์น™ ์ถ”์ฒœ ๋ชจ๋“ˆ 32 4 ์žฅ ์‹œ์Šคํ…œ ๊ฒ€์ฆ 37 5 ์žฅ ๊ฒฐ๋ก  ๋ฐ ํ–ฅํ›„ ๊ณผ์ œ 46 ์ฐธ๊ณ ๋ฌธํ—Œ 4

    Comparison of resampling methods for dealing with imbalanced data in binary classification problem

    No full text
    ์˜ํ•™์ „์‚ฐํ†ต๊ณ„ํ•™ํ˜‘๋™๊ณผ์ •์ด๋ถ„ํ˜•์ž๋ฃŒ์˜ ๋ถ„๋ฅ˜์—์„œ ์ž๋ฃŒ์˜ ๋ถˆ๊ท ํ˜• ์ •๋„๊ฐ€ ์‹ฌํ•œ ๊ฒฝ์šฐ "๊ณ„๊ธ‰ ๋ถˆ๊ท ํ˜•"(Prati 2009)๋ฌธ์ œ๊ฐ€ ๋ฐœ์ƒํ•œ๋‹ค. ์ด๋Ÿฌํ•œ ์ž๋ฃŒ์˜ ๋ถˆ๊ท ํ˜• ๋ฌธ์ œ ํ•ด๊ฒฐ์„ ์œ„ํ•ด ํ•™์Šต ์ž๋ฃŒ๋ฅผ ๋ณ€ํ˜•์‹œํ‚ค๋Š” ๋“ฑ์˜ ์—ฐ๊ตฌ๊ฐ€ ํ™œ๋ฐœํžˆ ์ง„ํ–‰๋˜๊ณ  ์žˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ์ด๋Ÿฌํ•œ ์ด๋ถ„ํ˜•์ž๋ฃŒ์˜ ๋ถ„๋ฅ˜๋ฌธ์ œ์—์„œ ๋ถˆ๊ท ํ˜•์„ ๋‹ค๋ฃจ๊ธฐ ์œ„ํ•œ ๋ฐฉ๋ฒ•๋“ค ์ค‘ ํ‘œ๋ณธ ์žฌ์ถ”์ถœ ๋ฐฉ๋ฒ•๋“ค์„ ๋น„๊ตํ•˜์˜€๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ์ž๋ฃŒ์—์„œ ํฌ์†Œ๊ณ„๊ธ‰์˜ ํƒ์ง€๋ฅผ ๋ณด๋‹ค ํšจ๊ณผ์ ์œผ๋กœ ํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ฐพ๊ณ ์ž ํ•˜์˜€๋‹ค. ์—ฐ๊ตฌ์—์„œ ์‚ฌ์šฉํ•œ ํ‘œ๋ณธ ์žฌ์ถ”์ถœ ๋ฐฉ๋ฒ•์€ ์ด 20๊ฐ€์ง€์ด๋ฉฐ ์˜ค๋ฒ„์ƒ˜ํ”Œ๋ง, CNN๊ธฐ๋ฐ˜ ์–ธ๋”์ƒ˜ํ”Œ๋ง, ์–ธ๋”์ƒ˜ํ”Œ๋ง, ์˜ค๋ฒ„์ƒ˜ํ”Œ๋ง ์–ธ๋”์ƒ˜ํ”Œ๋ง ํ˜ผํ•ฉ๋ฐฉ๋ฒ• ์ด 4๊ฐ€์ง€๋กœ ๋ถ„๋ฅ˜ํ•˜์˜€๋‹ค. ํ‘œ๋ณธ ์žฌ์ถ”์ถœ ๋ฐฉ๋ฒ•์„ ๋น„๊ตํ•˜๊ธฐ์œ„ํ•ด ๋ถ„๋ฅ˜๋ฌธ์ œ์—์„œ ๋Œ€ํ‘œ์ ์œผ๋กœ ์“ฐ์ด๋Š” ๋กœ์ง€์Šคํ‹ฑ ํšŒ๊ท€๋ถ„์„, Supoort Vector Machine, ๋žœ๋ค ํฌ๋ ˆ์ŠคํŠธ ๋ชจํ˜•์„ ์‚ฌ์šฉํ•˜์˜€๋‹ค. ๋ชจ์˜์‹คํ—˜์—์„œ๋Š” 4๊ฐœ์˜ ๋ชจํ˜•์„ ์‚ฌ์šฉํ•˜์˜€๋‹ค. ์ฒซ ๋ฒˆ์งธ ๋ชจ์˜์‹คํ—˜์€ ๋ถˆ๊ท ํ˜• ์ •๋„๋ฅผ ๊ณ ์ •ํ•˜๊ณ  ๋…๋ฆฝ๋ณ€์ˆ˜๋“ค์˜ ์„ ํ˜• ๊ฒฐํ•ฉ์œผ๋กœ ๋‚˜๋ˆŒ ์ˆ˜ ์—†๋Š” ์ˆ˜์‹์„ ์„ค์ •ํ•˜๊ณ , ์–‘ ๋๊ฐ’์— ์˜ค์ฐจ๋ฅผ ๋‘๊ณ  ์ข…์†๋ณ€์ˆ˜๋ฅผ ๋งŒ๋“ค์—ˆ๋‹ค. ๋‘ ๋ฒˆ์งธ ๋ชจ์˜์‹คํ—˜์€ ์ฒซ ๋ฒˆ์งธ ๋ชจ์˜์‹คํ—˜๊ณผ ๋™์ผํ•œ ์ƒํ™ฉ์— ํ•œ์ชฝ ๋์—๋งŒ ์˜ค์ฐจ๋ฅผ ๋‘๊ณ  ์ข…์†๋ณ€์ˆ˜๋กœ ๋งŒ๋“ค์—ˆ๋‹ค. ์„ธ ๋ฒˆ์งธ ๋ชจ์˜์‹คํ—˜์€ ์ข…์†๋ณ€์ˆ˜์˜ ์„ ํ˜• ๊ฒฐํ•ฉ์— ํ•œ์ชฝ ๋๊ฐ’์— ์˜ค์ฐจ๋ฅผ ๋‘๊ณ  ์ข…์†๋ณ€์ˆ˜๋ฅผ ๋งŒ๋“ค์—ˆ๋‹ค. ๋„ค ๋ฒˆ์งธ ๋ชจ์˜์‹คํ—˜์€ ์ข…์†๋ณ€์ˆ˜์˜ ์„ ํ˜• ๊ฒฐํ•ฉ์— ํ•œ์ชฝ ๋๊ฐ’์— ์„ธ ๋ฒˆ์งธ ๋ชจ์˜์‹คํ—˜์— ๋น„ํ•ด ์˜ค์ฐจ๋ฅผ ์ ๊ฒŒ ํ•˜๊ณ  ์ข…์†๋ณ€์ˆ˜๋ฅผ ๋งŒ๋“ค์—ˆ๋‹ค. ๋ชจ์˜์‹คํ—˜ ํ›„ ์‹ค์ œ๋ฐ์ดํ„ฐ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๋ถ„์„ํ•˜์˜€๋‹ค. ๋ถ„์„๊ฒฐ๊ณผ, ๊ฐ€์žฅ ๋งŽ์€ ๋ชจ์˜์‹คํ—˜๊ณผ ์ž๋ฃŒ๋ถ„์„์—์„œ ์ •ํ™•๋„๊ฐ€ 0.5 ์ด์ƒ์ด๋ฉด์„œ ๋ฏผ๊ฐ๋„๊ฐ€ ๋†’์•˜๋˜ ํ‘œ๋ณธ ์žฌ์ถ”์ถœ ๋ฐฉ๋ฒ•์€ Random Under Sampling(RUS)์˜€๋‹ค. ๊ทธ ๋‹ค์Œ์œผ๋กœ ๋ฏผ๊ฐ๋„๊ฐ€ ๋†’์•˜๋˜ ๋ฐฉ๋ฒ•์€ ์˜ค๋ฒ„์ƒ˜ํ”Œ๋ง ADASYN์ด์—ˆ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด RUS๋ฐฉ๋ฒ•์ด ํฌ์†Œ๊ณ„๊ธ‰๊ฐ’์„ ์ฐพ๊ธฐ ์œ„ํ•œ ๋ฐฉ์•ˆ์œผ๋กœ๋Š” ์ ํ•ฉํ–ˆ๋‹ค๋Š” ๊ฒƒ์„ ์•Œ ์ˆ˜ ์žˆ์—ˆ๋‹ค. ๋˜ํ•œ ๊ฐœ๋ฐœ๋œ ์˜ค๋ฒ„์ƒ˜ํ”Œ๋ง ๋ฐฉ๋ฒ•๋“ค์ด ์–ธ๋”์ƒ˜ํ”Œ๋ง ๋ฐฉ๋ฒ•๋“ค ๋ณด๋‹ค ๋ฏผ๊ฐ๋„ ์ˆ˜์น˜๊ฐ€ ๋†’์€ ๊ฒƒ์„ ํ™•์ธํ•˜์˜€๋‹ค. ๋ณธ ์—ฐ๊ตฌ๋ฅผ ํ†ตํ•ด ์ž„์˜๋กœ ํ‘œ๋ณธ์„ ๋ฝ‘๋Š” RUS ๋ฐฉ๋ฒ•์˜ ์ƒˆ๋กœ์šด ํ™•์žฅ ๊ฐ€๋Šฅ์„ฑ์„ ์ œ์‹œํ•˜๋Š” ๋ฐ”์ด๋‹ค.open์„

    ๊ด‘๊ธฐ๋ก ์žฅ์น˜์˜ ํ”ฝ์—…ํ—ค๋“œ์šฉ ์‹ค๋ฆฌ์ฝ˜ ์Šค์บ๋‹ ๋ฏธ๋Ÿฌ์˜ ์ œ์ž‘๊ณผ ๊ตฌ๋™์‹คํ—˜

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :์ „๊ธฐ.์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€,2001.Maste

    Restoration of implant-supported fixed dental prosthesis using the automatic abutment superimposition function of the intraoral scanner in partially edentulous patients

    No full text
    ๊ตฌ๊ฐ• ์Šค์บ๋„ˆ๋ฅผ ์ด์šฉํ•œ ๋””์ง€ํ„ธ ์ธ์ƒ๊ณผ CAD-CAM (Computer Aided Design-Computer Aided Manufacturing) ๊ธฐ์ˆ ์€ ์ ์ฐจ ๋ฐœ์ „ํ•˜๊ณ  ์žˆ๋‹ค. ์ „ํ†ต์ ์ธ ์ธ์ƒ ์ฑ„๋“, ์ž‘์—…๋ชจํ˜•์˜ ์ œ์ž‘, ์™์Šค ๋‚ฉํ˜• ์ œ์ž‘ ๋ฐ ์ฃผ์กฐ์˜ ๋ณต์žกํ•œ ๊ณผ์ •์ด ๋‹จ์ถ•๋˜์—ˆ์œผ๋ฉฐ ํ™˜์ž์˜ ๋ฐฉ๋ฌธ ํšŸ์ˆ˜๋„ ์ค„์ผ ์ˆ˜ ์žˆ๊ฒŒ ๋˜์—ˆ๋‹ค. ๊ตฌ๊ฐ• ์Šค์บ๋„ˆ ๊ธฐ์ˆ ์˜ ๋ฐœ์ „์œผ๋กœ ๋””์ง€ํ„ธ ์ธ์ƒ์˜ ์ •๋ฐ€๋„์™€ ์ •ํ™•์„ฑ์ด ํ–ฅ์ƒ๋˜์—ˆ์œผ๋ฉฐ, ๊ทธ ์ ์‘์ฆ์€ ๋ณด๋‹ค ๊ด‘๋ฒ”์œ„ํ•œ ๋ถ€์œ„์˜ ๊ณ ์ •์„ฑ ์น˜๊ณผ๋ณด์ฒ ๋ฌผ์˜ ์ˆ˜๋ณต์œผ๋กœ ์ ์ฐจ ํ™•๋Œ€๋˜์–ด์ง€๊ณ  ์žˆ๋‹ค. ๋ณธ ์ฆ๋ก€ ๋ณด๊ณ ์—์„œ๋Š” ๊ด‘๋ฒ”์œ„ํ•œ ๋ถ€์œ„์˜ ๊ณ ์ •์„ฑ ์ž„ํ”Œ๋ž€ํŠธ ๋ณด์ฒ ๋ฌผ์˜ ์ˆ˜๋ณต์„ ์œ„ํ•˜์—ฌ, ์ปดํ“จํ„ฐ๋กœ ๊ณ„ํšํ•˜๊ณ  ๊ฐ€์ด๋“œ ์ˆ˜์ˆ ์šฉ ํ…œํ”Œ๋ ˆ์ดํŠธ๋กœ ์™„์ „ํžˆ ๊ฐ€์ด๋“œ๋œ ์ˆ˜์ˆ ์„ ํ•˜๊ณ , ์ฆ‰์‹œ/์กฐ๊ธฐ ์ž„ํ”Œ๋ž€ํŠธ ๋ณด์ฒ ๋ฌผ์„ ์žฅ์ฐฉํ•˜์˜€์œผ๋ฉฐ, ์ž„์‹œ ๋ณด์ฒ ๋ฌผ์—์„œ ์ตœ์ข… ๋ณด์ฒ ๋ฌผ๋กœ ์ „ํ™˜ํ•˜๋Š” ๊ณผ์ •์—์„œ ๊ตฌ๊ฐ•์Šค์บ๋„ˆ์˜ ์ง€๋Œ€์ฃผ ์ค‘์ฒฉ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ํ™œ์šฉํ•˜์˜€๋‹ค. ์ž„ํ”Œ๋ž€ํŠธ ์ˆ˜์ˆ  ๋‹น์ผ ํš๋“ํ•œ ๊ตฌ๊ฐ•์Šค์บ”์œผ๋กœ ๋งž์ถคํ˜• ์ง€๋Œ€์ฃผ๋ฅผ ํฌํ•จํ•œ ์ž„์‹œ ๋ณด์ฒ ๋ฌผ์„ ์ œ์ž‘ํ•˜์—ฌ ํ™œ์šฉํ•˜์˜€์œผ๋ฉฐ, ์ตœ์ข… ๋ณด์ฒ ๋ฌผ์€ ์ž„์‹œ ๋ณด์ฒ ๋ฌผ์—์„œ์˜ ๋งž์ถคํ˜• ์ง€๋Œ€์ฃผ๋ฅผ ๋‚€ ์ฑ„๋กœ ๊ตฌ๊ฐ•์Šค์บ”ํ•˜์—ฌ ์ œ์ž‘๋˜์—ˆ๋‹ค. ์ด ๊ณผ์ •์—์„œ ์ž„์‹œ ๋ณด์ฒ ๋ฌผ ์žฅ์ฐฉ ์ „์— ๋ฏธ๋ฆฌ ์Šค์บ”ํ•ด์„œ ๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌํ™”ํ•œ ๋งž์ถคํ˜• ์ง€๋Œ€์ฃผ ๋ฐ์ดํ„ฐ๋ฅผ ๊ตฌ๊ฐ•์Šค์บ๋„ˆ ์†Œํ”„ํŠธ์›จ์–ด ์ง€๋Œ€์ฃผ ์ž๋™์ค‘์ฒฉ ๊ธฐ๋Šฅ์œผ๋กœ ์ตœ์ข… ๋””์ง€ํ„ธ ์ธ์ƒ์— ์ž๋™์ ์œผ๋กœ ๋งค์นญํ•˜์˜€๊ณ , ์น˜์€์—ฐํ•˜๋งˆ์ง„์ธ ๋ถ€๋ถ„๋„ ์ง€๋Œ€์ฃผ๋ฅผ ํƒˆ๊ฑฐํ•˜์ง€ ์•Š๊ณ , ์น˜์€์••๋ฐฐ์‚ฌ ์—†์ด ์ •๋ฐ€ํ•˜๊ฒŒ ํš๋“ํ•  ์ˆ˜ ์žˆ์—ˆ๋‹ค. ๊ตฌ๊ฐ•์Šค์บ๋„ˆ์™€ ์†Œํ”„ํŠธ์›จ์–ด์˜ ๋‹ค์–‘ํ•œ ๊ธฐ์ˆ ์„ ์‘์šฉํ•˜์—ฌ ์ž„ํ”Œ๋ž€ํŠธ ์น˜๋ฃŒ ๊ณผ์ •์„ ๋””์ง€ํ„ธ ์›Œํฌํ”Œ๋กœ์šฐ๋กœ ๋ณ€ํ™”์‹œํ‚ด์œผ๋กœ์จ, ํ™˜์ž ๋ถˆํŽธ๊ฐ ๋ฐ ์น˜๋ฃŒ ์‹œ๊ฐ„์„ ๋‹จ์ถ•ํ•˜์˜€์œผ๋ฉฐ, ํ™˜์ž์™€ ์ˆ ์ž์—๊ฒŒ ๋ชจ๋‘ ์ด๋กญ๊ณ  ์˜ˆ์ง€์„ฑ ์žˆ๋Š” ์น˜๋ฃŒ๊ฐ€ ๊ฐ€๋Šฅํ•˜์˜€๋‹ค.N
    corecore