참고문헌
- C. Kaufman, R. Perlman, and M. Speciner, Network Security: PRIVATE Communication in a PUBLIC World, Prentice Hall PTR, 1995
- Open Platform for Security(OPSEC) Technical Note, Check Point Softwate Technology, Inc., 2000. http://cgi.us checkpoint.com/rl/resourcelib.asp?state=1&item=opsectech
- J. Zao, L. Sanchez, M. Condell, C. Lynn, M. Fredette, P. Helinek, R. Krishnan, A. Jackson, D. Mankins, M. Shepard, and S. Kent, 'Domain Based Internet Security Policy Management,' Proceedings of DARPA Information Survivability COnference and EXposotion 2000 (DISCEX '00), Jan 25~27, 2000 https://doi.org/10.1109/DISCEX.2000.824955
- S. McClure, J. Scambray, and G. Kurtz, Hacking Exposed-Network Security Secrets & Solutions, McGraw Hill Companies, 1999
- Check Point OPSEC SDK Version 4.1 Release Notes, Check Point Softwate Technology, Inc., Nov 2, 1999. http://cgi.us.checkpoint.com/rl/resourcelib.asp?state=1&item=opsectech
- Secure Virtual Network Architecture: A Customer focused White Paper, Check Point Software Technologies Ltd., Nov. 2000. http://cgi.us.check point.com/rl/resourcelib.asp?state=1&item=SVNWP20
- Active Security Getting Started Guide Version 5.0, Network Associates, Inc., 1999
- Automating Security Management while Reducing Total Cost of Ownership : Active Security and WMI-White Paper, Network Associates, Inc., 1999
- D.Y. Lee, D.S. Kim, K.H. Pang, H.S. Kim, and T.M. Chung, 'A Design of Scalable SNMP Agent for Managing Heterogeneous Security Systems,' NOMS2000, 10 15 April 2000 https://doi.org/10.1109/NOMS.2000.830468
- D.S. Alexander, W.A Arbaugh, A.D. Keromytis, and J.M. Smith, 'Safety and Security of Programmable Network Infrastructures,' IEEE Communications Magazine, issue on Programmable Networks, Vol. 36, No. 10, pp. 84-92, Sep. 1998 https://doi.org/10.1109/35.722141
- D.L. Tennenhouse and D.J. Wetherall, 'Towards an Active Network Architecture,' Computer Communication Review, Vol. 26, No. 2, April 1996 https://doi.org/10.1145/231699.231701
- D. Wetherall, U. Legedza, and J. Guttag, 'Introducing New Internet Services: Why and How,' IEEE Network Magazine, July/August 1998 https://doi.org/10.1109/65.690955
- Konstantinos Psounis, 'Active Networks: Applications, Security, Safety, and Architectures,' IEEE Communications Surveys, First Quarter, 1999, http://www.comsoc.org/pubs/surveys
- A. Jeffrey and I. Wakeman, 'A Survey of Semantic Techniques for Active Networks,' 1997. http://www.cogs.susx.ac.uk/users/ianw/papers/an-survey.ps.gz
- D. Raz and Y. Shavitt, 'Active Networks for Efficient Distributed Network Management,' IEEE Communications Magazine, Vol. 38, No. 3, pp. 138-143, March 2000 https://doi.org/10.1109/35.825651
- 이현우, 정현철, 분산 환경에서의 서비스 거부 공격 분석보고서, CERTCC KR, 1999. http://www.certcc.or.kr/paper/tr1999/1999010/tr1999010.html
- 전익수, 이완희, Nimda Worm(W32/Nimda worm), CERTCC KR, 2001, http://www.certcc.or.kr/paper/incident.note/2001/in2001_0 15.html
- M. Sloman, 'Policy Driven Management For Distributed Systems,' Journal of Network and Systems Management, Vol. 2, No. 4, Plenum Press, pp. 333-360, 1994 https://doi.org/10.1007/BF02283186
- A.D. Rubin, D. Geer, and M.J Ranum, Web Security: Sourcebook, John Wiley & Sons, Inc., 1997
- V. Ahuja, Network & Internet Security, Academic Press, 1996
- H.F. Tipton, and M. Krause, Information Security Management Handbook, 4th ed., CRC Press LLC, 2000