DOI QR코드

DOI QR Code

DDoS Correspondence Index for Evaluating Performance Management

  • Received : 2010.10.26
  • Accepted : 2010.11.10
  • Published : 2010.12.31

Abstract

The damages from DDoS attacks are increasing as DDoS attacks are taking various forms. This has resulted not only in decreased reliability of organizations and corporations but also in the threat of national security. Organizations and corporations are making significant efforts in developing a system through which they can appropriately correspond to DDoS attacks. However, the studies on objective index for evaluating the performance of DDoS correspondence are lacking. The majority of the existing studies have been on the information protection & management system on a large scale. Accordingly, the scope of this thesis will be limited to DDoS correspondence to propose correspondence index for quantitatively measuring and managing them. The statistical techniques such as SMART technique and factor analysis will be utilized accordingly.

Keywords

References

  1. Simon Liu, "Surviving Distributed Denial-of-Service Attacks", IEEE Computer, pp51-53, 2009.
  2. Christos Douligeris and Aikaterini Mitrokotsa, "DDOS ATTACKS AND DEFENSE MECHANISMS: A CLASSIFICATION", Computer Networks: The International Journal of Computer and Telecommunications Networking, vol.44 , Issue.5, pp.643-666, 2004.04.
  3. Ruiliang Chen, Jung-Min Park, and Randolph Marchany, "A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of- Service Attacks", IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, vol.18, no.5, pp.577-588, 2007. 05. https://doi.org/10.1109/TPDS.2007.1014
  4. ISO/IEC 27001, Information technology - Security techniques - Information security management systems - Requirements, ISO, 2005.
  5. ISO/IEC 27002, Information Technology - Code of Practice for Information Security Management, ISO, 2007.
  6. McShane, S.L., Von Glinow, M.A., Organizational behavior: emerging realities for the workplace revolution(3rd), McGraw-Hill. 2005.
  7. Gorsuch R. L., Factor Analysis, Hillsdale, 1983.
  8. Cronbach L.J., "Coefficient alpha and internal structure of tests", Psycometrika, Vol.16, No.3, pp.297-334, 1951. https://doi.org/10.1007/BF02310555
  9. KISA, National Infoamtion Security Evaluation Index Model, KISA, 2006.
  10. MINISTRY OF Public Administration and Security, Evaluation Index of Personal Information Protection Level, MOPAS, 2007.
  11. ISO/IEC 27004, Information technology - Security techniques - Information security management - Measurement, ISO, 2009.