Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario


KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 2, pp. 65-72, Feb. 2015
10.3745/KTCCS.2015.4.2.65,   PDF Download:

Abstract

According to recent statistics published by the National Industrial Security Center, former and current employees are responsible for 80.4% of companies`` technology leakages, and employees of cooperative firms are responsible for another 9.6%. This means that 90% of technology leakages are intentionally or mistakenly caused by insiders. In a recent incident, a credit card company leaked private information, and the person responsible was an employee of a cooperative firm. These types of incidents have an adverse effect not only on a company``s assets but also on its reputation. Therefore, most institutions implement various security solutions to prevent information from being leaked. However, security solutions are difficult to analyze and distinguish from one another because their logs are independently operated and managed. A large number of logs are created from various security solutions. This thesis investigates how to prevent internal data leakage by setting up individual scenarios for each security solution, analyzing each scenario``s logs, and applying a monitoring system to each scenario.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. S. Park and I. Y. Lee, "Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario," KIPS Transactions on Computer and Communication Systems, vol. 4, no. 2, pp. 65-72, 2015. DOI: 10.3745/KTCCS.2015.4.2.65.

[ACM Style]
Jang Su Park and Im Yeong Lee. 2015. Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario. KIPS Transactions on Computer and Communication Systems, 4, 2, (2015), 65-72. DOI: 10.3745/KTCCS.2015.4.2.65.