메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색

논문 기본 정보

자료유형
학술저널
저자정보
저널정보
한국지식정보기술학회 한국지식정보기술학회 논문지 한국지식정보기술학회 논문지 제10권 제4호
발행연도
2015.1
수록면
465 - 473 (9page)

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색

초록· 키워드

오류제보하기
The problem of security management in document management system is that it is even harder to detect an authenticator who uses the system anomalously, although it is as much as possible to prevent and detect the movement of exposing information or destroying the system as a malicious purpose by means of passing through physical and logical protective devices of the system. To solve this problem, an usage status of a contents has been collected within a certain period of time, which is actually used at a specific site and the behavior patterns of a user based on data mining technique which has been analyzed. The main variable deciding a user's pattern has been analyzed and the user has been clustering according to the result. A single-host based on anomaly detection model was designed by techniques of K-Means and Self-Organizing Maps being used for clustering. This model detects a case where a specific user deviates the existing result of clustering in comparison of the result of experiment as anomaly. The content usage pattern of a user was utilized for the designed detection model while the existing detection model of anomaly was established through analysis of usage pattern of command or data packet. In this study, it is to discuss data mining-based anomaly detection model in which couldn't be solved out by the existing method, detection of a user’s intentional exposure of information, and the result of the experiment.

목차

등록된 정보가 없습니다.

참고문헌 (10)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

최근 본 자료

전체보기

댓글(0)

0