Intranet Security Evaluation Using Hacking Techniques 


Vol. 9,  No. 3, pp. 337-342, Jun.  2002
10.3745/KIPSTC.2002.9.3.337


PDF
  Abstract

In this paper, we proposed the ISL for evaluating the security level of Intranet. This method is composed of two parts : First, Hacking Scenarios are the hacking stories by hacking/hackers levels. Second, Network Model is composed of the zone and intrusion paths. Our method is very active and practical. We divide ISL into five levels : ISL1 ~ ISL5. Among the levels, ISL5 is the highest security level. Main purpose of this paper is to promote the security of Intranet. In this paper, we designed and analyzed the test-bed for ISL3.

  Statistics


  Cite this article

[IEEE Style]

D. I. Seo, B. C. Choi, S. W. Sohn, S. H. Lee, "Intranet Security Evaluation Using Hacking Techniques," The KIPS Transactions:PartC, vol. 9, no. 3, pp. 337-342, 2002. DOI: 10.3745/KIPSTC.2002.9.3.337.

[ACM Style]

Dong Il Seo, Byeong Choel Choi, Sung Won Sohn, and Sang Ho Lee. 2002. Intranet Security Evaluation Using Hacking Techniques. The KIPS Transactions:PartC, 9, 3, (2002), 337-342. DOI: 10.3745/KIPSTC.2002.9.3.337.