1 |
In-Kyoung Kim, Eul-Gyu Im, "A Study on the Analysis Rule for Network Intrusion Detection System using Snort", The Journal of Korean Institute of Communications and Information Sciences, Vol. 2011, No. 6, pp. 656-658, Jun 2011.
|
2 |
Yong-Woo Jung, "A Study on Normalized Rules of Security System", M.S. dissertation, Soongsil, Seoul, Jun 2017.
|
3 |
Keon-Woong Kong, Yong-gwan Won, "Implementation of Encrypted Mail Program using SMTP and POP3", the Journal of Digital Contents Society, Vol. 18, No. 7, pp.1403-1409, Nov 2017.
DOI
|
4 |
Doo-Won Sik, "A Study on the False Positive detection method of Intrusion Prevention System Using SVM", M.S. dissertation, Sungkyunkwan, Seoul, Apr 2017.
|
5 |
Dong-Hee Han, "A Study on the Method for Selecting Snort Intrusion Detection Rules for Improvement of Efficiency and Reduction of False Positive", M.S. dissertation, Korea, Seoul, 2015.12.
|
6 |
Kedar Namjoshi, Girija Narlikar, "Robust and Fast Pattern Matching for IDS", 2010 Proceedings IEEE, 2010.03.
|
7 |
Suricata[Internet], Available: http://www.suricata-ids.org.
|
8 |
Ji-yong Han, In-bok Lee, Jung-Hee Han, "Accelerating PCRE Performance of Signature-based IDS", The Journal of Korean Instityte of Information Scientistics and Engineering : System and Theory, Vol. 40, No. 2, pp. 53-60, Feb 2013.
|
9 |
M. Alicherry, M. Muthuprasanna, and V. Kumar, "High speed pattern matching for network IDS/IPS", Proceedings of the 2006 14th IEEE International Conference on. IEEE, Santa Barbara, CA, Feb 2006.
|
10 |
M. Roesch, "Snort : Light weight Intrusion Detection for Networks", Proceedings of LISA '99:13th Systems Administration Conference, Seattle, WA, Nov 1999.
|
11 |
Kil-Ho Lee, "A Study of Network Intrusion Detection System using Snort", M.S., Gyeongsang, Aug 2017.
|
12 |
Security Tools, Security Tool Top 100[Internet], Available : http://www.sectools.org
|
13 |
Ho-Sung Jo, Sung-Il Oh, In-Bok Lee, Hee-Jin Park, Joong-Chae Na, "Development and Application of a Similarity Analysis Program for Snort-based Detection Rules", The Journal of Korean Institute of Next Generation Computing, Vol.11, No.1, pp. 32-43, Feb 2015.
|
14 |
K. Scarfone and P. Mell, "Guide to intrusion detection and prevention systems(IDPS)", NIST, Gaithersburg, MD, Special Publication 800-94, Feb 2007.
|
15 |
Seok-Jin Ug, Moon-Seok Choi, Ji-Myung Kim, Jong-Soon Park, "A Comparative Study on Performance of Open Source IDS/IPS Snort and Suricata", The Journal of Korea Society of Digital Industry and Information Management, Vol. 12, No. 1, pp. 89-95, Mar 2016.
DOI
|
16 |
Snort, Snort User Manual[Internet], Available : http://manual-snort-org.s3-wesite-us-east-1.
|
17 |
Jay Beale, James C, Foster Jeffery Posluns, Brian Caswell, "Snort 2.0 Magic Box", Acorn, 2003.
|
18 |
Wikiphedia, Intrusion Detection System[Internet], Available: https://en.wikipedia.org/wiki/Intrusion_detection_system.
|
19 |
Snort[Internet], Available : http://www.snort.org.
|
20 |
S. Chakrabarti, M. Chakraborty, and I. Mukhopadhyay, "Study of snort-based IDS", Proceedings of the International Conference and Workshop on Emerging Trends in Technology, ACM, 2010.
|
21 |
Myeong-Ki Jeong, Seong-Jin Ahn, Won-Hyung Park, "A Comparative Study on Function and Performance of Snort and Suricata", The Journal of Information and Security, Vol. 14, No 5, pp.3-8, Sep 2014.
|
22 |
Yong-Sik Jeon, "Cost-Based Optimizer Detection Tree configuration plan for performance improvement of Signature-Based IDS", M.S. dissertation, Korea, Seoul, 2017.05.
|