Abstract
Due to the development of information and communication technologies, there is a growing dependence on the computer. Based on the accidents occurred in the country, this dependence means that if people have a problem in terms of cyber security, it will cause great confusion nationally. Even though there are a lot of security solutions to prevent it, security incidents have continued to occur because the number of solutions confined to a specific function have duplication and vulnerability. In order to overcome the limitation of the information security environment, it has been proposed an inspection system using the SDN of the new concept. In this paper, we will propose log analysis system to be applied within the inspection system using these SDN.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Nam, K., et al.: The design of SDN quarantined network. In: The 2014 Fall Conference of the KIPS, pp. 559–560 (2014)
Jung, Y., et al.: ESM technology trends for the security of the network. Electronics and Telecommunications Trends (2001)
Kim, H., et al.: Cloud Computing Implementing Technology. Acornpub (2011)
Yoon, S., et al.: A Study on the Intrusion Detection Method using Firewall Log. Journal of Information Technology Applications & Management (2006)
McKeown, N.: Software-defined networking. INFOCOM keynote talk (2009)
Junho, C., Dong-Gyu, S., Kun-Won, J., Moon-Seog, J.: Analysis of Security Vulnerability on Firewall Logging Mechanism against DDoS Attack. Journal of KIISC 17(6) (2007)
Dae-Soo, C., Gil-Jong, M., Yong-Min, K., Bong-Nam, N.: An Analysis of Large-Scale Security Log using MapReduce. Journal of KIIT 9(8) (2011)
Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Communications of the ACM 51(1) (2008)
Chen, W.-Y., Wang, J.: Building a cloud computing analysis system for intrusion detection system. In: CLOUD SLAM (2009)
White, T.: Hadoop Definitive Guide. O’Reilly Media (2009)
Lee, Y., Kang, W., Son, H.: An internet traffic analysis method with MapReduce. In: The 1st IEEE/IETP Workshop on Cloud Management (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Singapore
About this paper
Cite this paper
Kim, TY., Kim, NU., Chung, TM. (2015). The Design of Log Analysis Mechanism in SDN Quarantined Network System. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_48
Download citation
DOI: https://doi.org/10.1007/978-981-10-0281-6_48
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0280-9
Online ISBN: 978-981-10-0281-6
eBook Packages: Computer ScienceComputer Science (R0)