Intranet Security Evaluation Using Hacking Techniques


The KIPS Transactions:PartC, Vol. 9, No. 3, pp. 337-342, Jun. 2002
10.3745/KIPSTC.2002.9.3.337,   PDF Download:

Abstract

In this paper, we proposed the ISL for evaluating the security level of Intranet. This method is composed of two parts : First, Hacking Scenarios are the hacking stories by hacking/hackers levels. Second, Network Model is composed of the zone and intrusion paths. Our method is very active and practical. We divide ISL into five levels : ISL1 ~ ISL5. Among the levels, ISL5 is the highest security level. Main purpose of this paper is to promote the security of Intranet. In this paper, we designed and analyzed the test-bed for ISL3.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
D. I. Seo, B. C. Choi, S. W. Sohn, S. H. Lee, "Intranet Security Evaluation Using Hacking Techniques," The KIPS Transactions:PartC, vol. 9, no. 3, pp. 337-342, 2002. DOI: 10.3745/KIPSTC.2002.9.3.337.

[ACM Style]
Dong Il Seo, Byeong Choel Choi, Sung Won Sohn, and Sang Ho Lee. 2002. Intranet Security Evaluation Using Hacking Techniques. The KIPS Transactions:PartC, 9, 3, (2002), 337-342. DOI: 10.3745/KIPSTC.2002.9.3.337.