참고문헌
- F. Tariq and S. Baig, "Multiclass Machine Learning Based Botnet Detection in Software Defined Networks," IJCSNS, vol. 19, no. 3, p. 150, 2019.
- Nespoli, Pantaleone, et al. "Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks." IEEE Communications Surveys & Tutorials 20.2 (2017): 1361-1396.
- Chung, Chun-Jen, et al. "NICE: Network intrusion detection and countermeasure selection in virtual network systems." IEEE transactions on dependable and secure computing 10.4 (2013): 198-211.
- F. Tariq and S. Baig, "Botnet classification using centralized collection of network flow counters in software defined networks," Int. J. Comput. Sci. Inf. Secur., vol. 14, no. 8, p.
- F. Tariq and S. Baig, "Machine learning based botnet detection in software defined networks," Int. J. Secur. Its Appl., vol. 11, no. 11, pp. 1-11, 2017.
- Koulouris, Theofrastos, M. Casassa Mont, and Simon Arnell. "SDN4S: Software defined networking for security." Hewlett Packard Labs, Palo Alto, CA, USA, Tech. Rep (2017).
- Chakir, El Mostapha, Mohamed Moughit, and Youness Idrissi Khamlichi. "A real-time risk assessment model for intrusion detection systems." 2017 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2017.
- Chakir, El Mostapha, Mohamed Moughit, and Youness Idrissi Khamlichi. "A real-time risk assessment model for intrusion detection systems." 2017 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2017.
- N. Poolsappasit, R. Dewri, and I. Ray, "Dynamic security risk management using bayesian attack graphs," IEEE Trans. Dependable and Secure Computing, vol. 9, no. 1, pp. 61-74, Feb. 2012.
- Open Networking Fundation, "Software-defined networking: The new norm for networks," ONF White Paper, Apr. 2012.
- Wang, Lingyu, Anyi Liu, and Sushil Jajodia. "Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts." Computer communications 29.15 (2006): 2917-2933.
- Cichonski, Paul, et al. "Computer security incident handling guide." NIST Special Publication 800.61 (2012): 1-147.
- Don, Moira West-Brown, et al. "Handbook for computer security incident response teams (CSIRTs)." (1998).
- Wagner, Neal, et al. "Towards automated cyber decision support: A case study on network segmentation for security." 2016 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE, 2016.
- Poolsappasit, Nayot, Rinku Dewri, and Indrajit Ray. "Dynamic security risk management using bayesian attack graphs." IEEE Transactions on Dependable and Secure Computing 9.1 (2011): 61-74.
- Modi, Ajay, and A. Doupe. "Automated Confidence Score Measurement of Threat Indicators." (2017).