초록

With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/ authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

키워드

e-Trade, Bayesian networks, ERP, FTP

참고문헌(31)open

  1. [학술지] 김선숙 / 2002 / 인터넷쇼핑몰 성공의 열쇠

  2. [학술지] 김준한 / 2002.06 / 일본의 인터넷 이용현황 및 전망, 정보통신정책

  3. [학술지] 김재전 / 2003 / 성공적인 SCM을 위한 공급사슬 파트너쉽의 구조적 관계 모형에 관한 연구 6 (1) : 36 ~ 52

  4. [학술지] 김학민 / 2005 / 전자무역의 학제적 특성 및 실행체계에 관한 연구 30 (5) : 114 ~ 139

  5. [학술지] 김태환 / 2007 / 한국의 전자무역네트워크 구축사업의 현황과 개선방안에 관한 연구 8 (1) : 116 ~ 145

  6. [학술지] 문희철 / 1995 / 우리나라 무역업체의 EDI 도입 및 구현에 관한 실증적 연구 20 (2) : 96 ~ 124

  7. [학술지] 변대호 / 2001 / 믿을 수 있는 전자상거래 쇼핑몰

  8. [학술지] 손용엽 / 2001 / 사이버 시장의 경쟁원리

  9. [학술지] 산업자원부 한국전자거래진흥원 / 2004 / 2004 e-비즈니스 백서

  10. [학술지] 서아영 / 2001.11 / 공급자-구매자 관계유형에 따른 공급사슬관리 성공요인에 관한 실증연구 3 (1) : 136 ~ 152

  11. [학술지] 이동만 / 2001 / 정보기술목표와 정보기술 기업가치간의 관련성 / 경영교육연구 (24)

  12. [학술지] 한국전자통신연구원 / 2002 / 50대 전략품목 기술/시장보고서

  13. [학술지] 황수성 / 2001 / 인터넷 전자상거래 세계동향과 대응방안

  14. [학술지] Bobby Vandalore / 1998 / A Definition of General Weighted Fairness and its Support in Explicit Rate Switch Algorithms : 204 ~ 229

  15. [학술지] Christoper M. Bishop / 2001 / Neural Networks for Pattern Recognition : 385 ~ 433

  16. [학술지] Christina Warrender / 2004 / Detecting Intrusion Using System Calls : Alternative Data Models : 146 ~ 167

  17. [학술지] DeLone, W. H / 2003 / The DeLone and McLean-Model of Information Systems Success: A Ten-Year Update 19 (4) : 49 ~ 61

  18. [학술지] Eleazar Eskin / 2000 / Anomaly Detection over Noisy Data using Learned Probability Distributions : 151 ~ 172

  19. [학술지] Gray, P / 2000 / The effects of knowledge management systems on emergent teams : Towards a research model 9 (2-3) : 146 ~ 161

  20. [학술지] Jiawei Han / 2001 / Data Mining Concepts and Techniques : 86 ~ 105

  21. [학술지] Krubel, Karl / 1998.04.06-09 / Benefits and Shortcomings of Business Internet Use: Conclusions from an Empirical Study of German Companies : 283 ~ 302

  22. [학술지] Matthew V. Mahoney / 2001 / PHAD : Packet Header Anomaly Detection for Identifying Hostile Network Traffic : 163 ~ 195

  23. [학술지] Matthew V. Mahoney / 2003 / Learning Nonstationary Models of Normal Network Traffic for Detecting Novel Attacks : 117 ~ 132

  24. [학술지] Mehdi Nassehi / 2001 / Characterizing Masqueraders for Intrusion Detection : 268 ~ 277

  25. [학술지] N. Ye / 2002 / Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection 51 (7) : 808 ~ 828

  26. [학술지] S. A. Hofmeyr / 1998 / Intrusion Detection using Sequences of System Calls : 151 ~ 180

  27. [학술지] Steven Noel / 2002 / Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt : 302 ~ 324

  28. [학술지] Susan M. Bridges / 2000.10 / Fuzzy Data Mining And Genetic Algorithms Applied to Intrusion Detection : 16 ~ 19

  29. [학술지] Tallon, P.P / 2000 / Executive's Perceptions of the Business Value of Information Technology: A Process-Oriented Apporach 16 (4) : 116 ~ 132

  30. [학술지] W. Lee / 1997.07 / Learning Patterns from Unix process Execution Traces for Intrusion Detection : 50 ~ 56

  31. [학술지] W. Lee / 1997.07 / Learning Patterns from Unix process Execution Traces for Intrusion Detection : 50 ~ 56