참고문헌
- S.B. Han and S.K. Hong, "A countermeasure against the APT attack in the financial sector," Review of KIISC, vol. 23, no. 1, pp. 44-53, 2013.
- S.C. Noh and K.C. Bang, "A Study on Methodology for Protection of Malicious Traffic in groupware Network System," Journal of Digital Contents Society, vol. 8, no. 1, pp. 69-76, 2007.
- W.G. Kim and S.G. Lee, "An improvement of server diffusion prevention of APT attack through the end-point detection and blocking," in Proceedings of the Korean Society of Computer Information Conference, vol. 25, no. 1, pp. 133-134, 2017.
- D.S. Moon, H.S. Lee, and I.K. Kim. "Host based feature description method for detecting APT attack," Journal of the Korea Institute of Information Security & Cryptology, vol. 24, no. 5, pp. 839-850, 2014. https://doi.org/10.13089/JKIISC.2014.24.5.839
- K.H. Son, T.J. Lee, and D.H. Won. "Design for zombie PCs and APT attack detection based on traffic analysis," Journal of the Korea Institute of Information Security & Cryptology, vol. 24, no. 3, pp. 491-498, 2014. https://doi.org/10.13089/JKIISC.2014.24.3.491
- M.G. Lee and C.S. Bae, "A study for the principle cases of advanced persistent threat attacks," in Proceeding of The Institute of Electronics Engineers of Korea, pp. 939-942, 2013.
- Korea Communications Commission, Report of Investigation for Privacy Leakage at Interpark, Available : http://www.kcc.go.kr/user.do?mode=view&page=A05030000&dc=K00000001&boardId=1113&boardSeq=42740
- Burton Bloom, "Space/time tradeoffs in hash coding with allowable errors," Communications of the ACM, vol. 13, no. 7, pp. 422-426. 1970. https://doi.org/10.1145/362686.362692
- S.Y. Kim and J.H. Kim, "An analysis on the error probability of a Bloom filter," Journal of the Korea Institute of Information Security & Cryptology, vol. 24, no. 5, pp. 809-815, 2014. https://doi.org/10.13089/JKIISC.2014.24.5.809
- E.S. Jung, S.W. Yoo, C.H. Han, and E.J. Park. "Effective detecting DoS attack and scanning at Internet backbone using Bloom filter," in Proceedings of Symposium of the Korean Institute of Communications and Information Sciences, pp. 1298-1301, 2003.
- B.J. Choi, M.H. Jeong, S.W. Yoo, B.H. Roh, and K.H. Kim, "Optimized web-server defense against DDoS attack by Bloom filter," Journal of Korean Society for Internet Information, vol. 6, no. 1, pp. 33-36, 2005.
- S.J. Moon, "Server Management Prediction System based on Network Log and SNMP," Journal of Digital Contents Society, vol. 18, no. 4, pp. 747-751, 2017. https://doi.org/10.9728/DCS.2017.18.4.747