1 |
신승원, 강동호, 김기영, 장종수, 'DPI(Deep Packet Inspection) 기술 분석,' 전자통신동향분석. 2004.04
|
2 |
전용희, 류걸우, 장종수, '침입탐지시스템과 침입방지시스템의 기술 비교 및 동향', 정보통신연구진흥원 2004.6.9
|
3 |
허영준, 류걸우, 장종수, 'Abnormal Traffic Detection for Network Intrusion Detection,' SAM.2004
|
4 |
안개일, 김기영, 류걸우, 장종수, '비정상 트래픽의 대역폭 제한 결정 메커니즘', JCCI 2004.04
|
5 |
Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan In Proc IEEE Symposium on Security and Privacy, Oakland, CA, May, 2004
|
6 |
Packeteer, 'Detect and limit DoS attacks,' white paper, http://support.packeteer.com/.../prevent-dos-attacks.html
|
7 |
Hyang-Ah Kim, Brad Karp, 'Autograph : Toward Automated, Distributed Worm Signature Detection,' USENIX Security Symposium July. 2004
|
8 |
S. Northcutt, M. Cooper, M. Fearnow, and K. Frederick, 'Intrusion Signature and Analysis,' new riders, 2000
|
9 |
전용희, 김기영, 장종수, '네트워크-기반 침입방지 시스템 성능평가 기술 동향', 정보통신연구진흥원 2004.8.11
|
10 |
Cisco Systems, 'Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks,' white paper, .http://www.cisco.com/warp/./newsflash.html, Feb.2000
|
11 |
David Newman, Joel Snyder and Rodney Thayer, 'Crying wolf: False alarms hide attacks,' Network World, Jun. 2002
|