Personal tools
You are here: Home Engineering 침입탐지시스템(Intrusion Detection System) Lecture Notes

Lecture Notes

Document Actions
  • Send this
  • Print this
  • Content View
  • Bookmarks

Week 

   Content 

Lecture

Note

 1

 Course orientation

(brief about intrusion detection, course objectives, scoring policy, chapter summary, etc.)  

pdf   

 2

Concept of IDS/IPS 

  pdf 

 3

W-IDPS, NBA, H-IDPS

    pdf

 4

W-IDPS, NBA, H-IDPS

   

 5

 Lifecycle of a vulnerability

[Selected paper reading]

 - Lingyu Wang, Steven Noel, Sushil Jajodia, "Minimum-cost network hardening using attack graphs",

Computer Communications,  Vol.29, pp.3812–3824, 2006

 - STEVEN NOEL, SUSHIL JAJODIA, "Measuring Security Risk of Networks Using Attack Graphs",

International Journal of Next-Generation Computing, Vol. 1, No. 1, July 2010 

 - STEVEN NOEL, SUSHIL JAJODIA, "Measuring Security Risk of Networks Using Attack Graphs",

International Journal of Next-Generation Computing, Vol. 1, No. 1, July 2010 

pdf   

 6

NBA and useful tools

pdf

 7

Web Application Firewall

 pdf

 8

Web Application Firewall (OWASP top 10 and WAF)

pdf      

 9

 

               

10

Chapter.9 - Physical Intrusion Detection for IT

pdf   

11

Chapter.10 – geospatial intrusion detection

      

12

Chapter.11 – Visual Data Communications

        

13

Security visualization

selected paper reading

HYUNSANG CHOI, HEEJO LEE*, HYOGON KIM, “Fast detection and visualization of network attacks on parallel coordinates”, Computers & Security, vol.28, pp. 276-288, 2009

pdf    

14

Term project

    pdf      

Copyright 2009, by the Contributing Authors. Cite/attribute Resource. Lecture Notes. (2011, July 28). Retrieved April 17, 2014, from Korea University OpenCourseWare Web site: http://ocw.korea.edu/ocw/college-of-engineering/ce68c785d0d0c9c0c2dcc2a4d15c/lecture-notes. This work is licensed under a Creative Commons License Creative Commons License