참고문헌
- G. Loukas and G. Oke, "Protection against denial of service attacks: a survey," The Computer Journal, vol. 53, pp. 1020-1037, 2010. https://doi.org/10.1093/comjnl/bxp078
- M. Li, J. Li, and W. Zhao, "Simulation study of flood attacking of DDOS," in Proc of International Conference on Internet Computing in Science and Engineering 2008, pp. 286-293.
- H. Tsunoda, K. Ohta, A. Yamamoto, N. Ansari, Y. Waizumi, and Y. Nemoto, "Detecting DRDoS attacks by a simple response packet confirmation mechanism," Computer Communications, vol. 31, pp. 3299-3306, 2008. https://doi.org/10.1016/j.comcom.2008.05.033
- W. Liu, "Research on DoS attack and detection programming," in Proc. of Third International Symposium on Intelligent Information Technology Application 2009, pp. 207-210.
- J. Nazario, "DDoS attack evolution," Network Security, vol. 2008, pp. 7-10, 2008.
- G. Kambourakis, T. Moschos, D. Geneiatakis, and S. Gritzalis, "Detecting DNS amplification attacks," in Critical Information Infrastructures Security, ed: Springer, 2008, pp. 185-196.
- M.-J. Chen, K.-P. Chien, C.-Y. Huang, B.-C. Cheng, and Y.-S. Chu, "An ASIC for SMTP Intrusion Prevention System," in Proc. of IEEE International Symposium on Circuits and Systems 2009, pp. 1847-1850.
- F. Huici, S. Niccolini, and N. d'Heureuse, "Protecting SIP against very large flooding DoS attacks," in Proc. of Global Telecommunications Conference 2009, pp. 1-6.
- J. Yu, H. Lee, M.-S. Kim, and D. Park, "Traffic flooding attack detection with SNMP MIB using SVM," Computer Communications, vol. 31, pp. 4212-4219, 2008. https://doi.org/10.1016/j.comcom.2008.09.018
- Z. Zhu, G. Lu, Y. Chen, Z. J. Fu, P. Roberts, and K. Han, "Botnet research survey," in Proc. of 32nd Annual IEEE International Computer Software and Applications 2008, pp. 967-972.
- I. Mopari, S. Pukale, and M. Dhore, "Detection and defense against DDoS attack with IP spoofing," in Proc. of International Conference on Computing, Communication and Networking 2008, pp. 1-5.
- J. Udhayan and R. Anitha, "Demystifying and rate limiting ICMP hosted DoS/DDoS flooding attacks with attack productivity analysis," in Proc. of IEEE International Conference on Advance Computing Conference 2009, pp. 558-564.
- H. Y. Youm, "Korea's experience of massive DDoS attacks from Botnet," ITU-T SG, vol. 17, 2011.
- S.-H. Kang, K.-Y. Park, S.-G. Yoo, and J. Kim, "DDoS avoidance strategy for service availability," Cluster Computing, pp. 1-8, 2013.
- J. Eom, " The Active Deterrence Strategy of Cyberwarfare for Cyber Security," Journal of Security Engineering, vol. 10, 2013.