Browse > Article

정보통신 시스템 인프라를 위한 침입 방지용 통합 보안 기술  

Kim, Jeong-Nyeo (한국전자통신연구원)
Jang, Jong-Su (한국전자통신연구원)
Son, Seung-Won (한국전자통신연구원)
Publication Information
Keywords
Integrated Security Engine; Firew all; Intrusion Detection; Virtual Private Network; Node Intrusion Tolerance;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Brent Chapman, Elizabeth D. Zwicky, Building Internet Firewalls, O Reilly & Associations, Inc. January 1996
2 David F. Ferraiolo, Ravi Sandu, & Serban Gavrila, 'A Proposed Standard for Role-Based Access Control,' ACM transaction on Information and System Security, V0L.4, N0.3, pp.224-274, Aug. 2001   DOI
3 DoD 5200.28-STD. 'Department of Defense Trusted Computer System Evaluation Criteria', December 1985
4 http://www.symantec.com/
5 http://www.cisco.com/
6 http://www.nortelnetworks.com/
7 RFC 1858, Security Considerations for IP Fragment Filtering
8 B. H. Jung, J. N. Kim, 'Design of Dynamic Intrusion Detection Rule Modification Technique for Kernel Level Intrusion Detection,' 한국정보처리학회 추계학술대회 논문집, Vol. 9, No. 2, Nov. 2002
9 Dorothy E, Denning, 'Information Warfare and Secuhty', Addison-wesley, April 1999
10 William R. Cheswick, Steven M. Bellovin Firewalls and Internet Security: Repelling the Willy hacker, Addison Wesley, 1994
11 An Introduction to Computer Security : The NIST Handbook, NIST Special Publication 800-12, January 1
12 http://www.enterasys.com/
13 http://www.ecommerce.go.kr/tongl.asp
14 Linux 2.4.18 Krnel-RELEASE Source Code
15 S.H. Jo, J. N. Kim, & S. W. Sohn, 'Design of Web-based Security Management for Intrusion Detection', Proc. of ICEB, ICEB '2002, 2002
16 Chris Hare, Karanjit Siyan, Internet Firewalls and Network Security ? 2nd ed. New Readers, 1996
17 InSeon Yoo and Ulrich Ultes-Nitsche , 'An Intelligent Firewall to Detect Novel Attacks? An Integrated Approach based on Anomaly Detection Against Virus Attacks,' November 2002
18 http://isis.nic.or.kr/sub05/sub05_index.html
19 J. G. Ko, J. N. Kim, & K. I. Jeong, 'Access Control for Secure FreeBSD Operating System,' Proc. of WISA 2001, The Second International Workshop on Information Security Applications, 2001
20 Ulrich Ultes-Nitsche and InSeon Yoo, 'An integrated Network Security Approach-Pairing Detecting Malicious Patterns with Anomaly Detection, ' Proc. of Conference on Korean Science and Engineering Association in UK(KSEAUK2002), July 2002
21 Peter A. Loscocco, Wtephen D. Dmalley, Patric A. Muckelbauer, Ruth C. Taylor, S.Jeff Truner, John F. Farrel, 'The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments', National Security Agency, 1997
22 Dorothy E, Denning, 'Information Warfare and Security', Addison-wesley, April 1999
23 정연서, 류걸우, 남택용, 손승원, '사이버 위협에 대한 보안 솔루션 기술 동향,' ETRI 주간 기술 동향, 2002 October
24 조대일, 송규철, 노병구, 네트워크 침입탐지와 해킹 분석 핸드북, 인포북, 2001
25 D.Ferraolo and R, Kuhn, 'Role-Based Access Control', Proceeding of the 15th National Computer Security Conference, 1992
26 http://www.fortinet.co.kr/