1 |
D. Brent Chapman, Elizabeth D. Zwicky, Building Internet Firewalls, O Reilly & Associations, Inc. January 1996
|
2 |
David F. Ferraiolo, Ravi Sandu, & Serban Gavrila, 'A Proposed Standard for Role-Based Access Control,' ACM transaction on Information and System Security, V0L.4, N0.3, pp.224-274, Aug. 2001
DOI
|
3 |
DoD 5200.28-STD. 'Department of Defense Trusted Computer System Evaluation Criteria', December 1985
|
4 |
http://www.symantec.com/
|
5 |
http://www.cisco.com/
|
6 |
http://www.nortelnetworks.com/
|
7 |
RFC 1858, Security Considerations for IP Fragment Filtering
|
8 |
B. H. Jung, J. N. Kim, 'Design of Dynamic Intrusion Detection Rule Modification Technique for Kernel Level Intrusion Detection,' 한국정보처리학회 추계학술대회 논문집, Vol. 9, No. 2, Nov. 2002
|
9 |
Dorothy E, Denning, 'Information Warfare and Secuhty', Addison-wesley, April 1999
|
10 |
William R. Cheswick, Steven M. Bellovin Firewalls and Internet Security: Repelling the Willy hacker, Addison Wesley, 1994
|
11 |
An Introduction to Computer Security : The NIST Handbook, NIST Special Publication 800-12, January 1
|
12 |
http://www.enterasys.com/
|
13 |
http://www.ecommerce.go.kr/tongl.asp
|
14 |
Linux 2.4.18 Krnel-RELEASE Source Code
|
15 |
S.H. Jo, J. N. Kim, & S. W. Sohn, 'Design of Web-based Security Management for Intrusion Detection', Proc. of ICEB, ICEB '2002, 2002
|
16 |
Chris Hare, Karanjit Siyan, Internet Firewalls and Network Security ? 2nd ed. New Readers, 1996
|
17 |
InSeon Yoo and Ulrich Ultes-Nitsche , 'An Intelligent Firewall to Detect Novel Attacks? An Integrated Approach based on Anomaly Detection Against Virus Attacks,' November 2002
|
18 |
http://isis.nic.or.kr/sub05/sub05_index.html
|
19 |
J. G. Ko, J. N. Kim, & K. I. Jeong, 'Access Control for Secure FreeBSD Operating System,' Proc. of WISA 2001, The Second International Workshop on Information Security Applications, 2001
|
20 |
Ulrich Ultes-Nitsche and InSeon Yoo, 'An integrated Network Security Approach-Pairing Detecting Malicious Patterns with Anomaly Detection, ' Proc. of Conference on Korean Science and Engineering Association in UK(KSEAUK2002), July 2002
|
21 |
Peter A. Loscocco, Wtephen D. Dmalley, Patric A. Muckelbauer, Ruth C. Taylor, S.Jeff Truner, John F. Farrel, 'The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments', National Security Agency, 1997
|
22 |
Dorothy E, Denning, 'Information Warfare and Security', Addison-wesley, April 1999
|
23 |
정연서, 류걸우, 남택용, 손승원, '사이버 위협에 대한 보안 솔루션 기술 동향,' ETRI 주간 기술 동향, 2002 October
|
24 |
조대일, 송규철, 노병구, 네트워크 침입탐지와 해킹 분석 핸드북, 인포북, 2001
|
25 |
D.Ferraolo and R, Kuhn, 'Role-Based Access Control', Proceeding of the 15th National Computer Security Conference, 1992
|
26 |
http://www.fortinet.co.kr/
|