Browse > Article

Zero-day 공격 대응을 위한 네트워크 보안의 지능화 기술  

Jeong, Il-An (한국전자통신연구원)
Kim, Ik-Gyun (한국전자통신연구원)
O, Jin-Tae (한국전자통신연구원 보안게이트웨이연구팀)
Jang, Jong-Su (한국전자통신연구원 보안응용 그룹)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Inside the Slammer, in IEEE Security and Privacy 2003
2 IDC, Korea Security Appliances 2004-2008 Forecast and Analysis, 2005
3 EMIST project, http://emist.ist.psu.edu
4 IETF RFC 3460, Policy Core Information Model (PCIM) Extensions, 2003
5 Newsome, J., Karp, B., and Song, D., "Polygraph: Automatically Generating Signatures for Polymorphic Worms," Proc. of the IEEE Symposium on Security and Privacy, 2005
6 Symantec ISTR VXI, 2007
7 IETF RFC 4765, The Intrusion Detection Message Exchange Format (IDMEF), 2007
8 IETF RFC 4767, The Intrusion Detection Exchange Protocol (IDXP), 2007
9 Singh S., Estan C., Varghese G., and Savage S., "Automated worm fingerprinting," Proc. of 6th Symposium on Operating System Design and Implementation, 2004
10 Levitt K,N., Rowe J. and Schooler E. M., "A Distributed Host-based Worm Detection System," the Special Interest Group on Data Communication, 2006
11 IETF RFC 3080, The Blocks Extensible Exchange Protocol Core (BEEP), 2001
12 H. -A., Kim and Karp, B. "Autograph: Toward Automated, Distributed Worm Signature Detection," Proc. of the 13th Usenix Security Symposium, 2004
13 ETRI-ZASMIN, http.//www.etri.re.kr
14 IDC, Worldwide IT Security Software, Hardware, and Services 2004-2008 Forecast: The Big Picture