2014
DOI: 10.13089/jkiisc.2014.24.3.507
|View full text |Cite
|
Sign up to set email alerts
|

An Auto-Verification Method of Security Events Based on Empirical Analysis for Advanced Security Monitoring and Response

Abstract: Domestic CERTs are carrying out monitoring and response against cyber attacks using security devices(e.g., IDS, TMS, etc) based on signatures. Particularly, in case of public and research institutes, about 30 security monitoring and response centers are being operated under National Cyber Security Center(NCSC) of National Intelligence Service(NIS). They are mainly using Threat Management System(TMS) for providing security monitoring and response service. Since TMS raises a large amount of security events and m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Notable video conferencing systems include Zoom, Cisco Webex, Facebook, Microsoft Teams, and Google Meet. Among them, the average number of Zoom users in 2020 increased by over 40 times compared to 2019 [11].…”
Section: Vulnerable Case Of Video Conferencing System Securitymentioning
confidence: 98%
See 1 more Smart Citation
“…Notable video conferencing systems include Zoom, Cisco Webex, Facebook, Microsoft Teams, and Google Meet. Among them, the average number of Zoom users in 2020 increased by over 40 times compared to 2019 [11].…”
Section: Vulnerable Case Of Video Conferencing System Securitymentioning
confidence: 98%
“…In addition to intentional attacks, Zoom has experienced various security vulnerability issues. Zoom was also aware of these, and took measures such as upgrading the encryption algorithm to AES-256-GCM or adding a 2-Factor Authentication method to solve it [11]. Although Zoom has addressed most of the vulnerabilities, its E2EE function has only been partially addressed.…”
Section: Vulnerable Case Of Video Conferencing System Securitymentioning
confidence: 99%