1 |
B. A. Forouzan, TCP/IP Protocol Suite, Fourth Edition. New York, NY: McGRAW HILL INTERNATIONAL EDITION, p. 246, 2010.
|
2 |
IETF Std. RFC 1122, Requirements for Internet Hosts - Communication Layers, IETF, R. Braden, October 1989.
|
3 |
D. Yang, Introduction to information security, Seoul, Hanbit Academy. Inc, pp. 102-107, 2008.
|
4 |
IETF Std. RFC 5927, ICMP Attacks against TCP, IETF, F. Gont, July 2010.
|
5 |
K. J. Yoo, E. G. Kim, "A study on the outbound traffic controller for prevention of ICMP attacks," in The 40 th Conference of KIICE, Daejeon, pp. 1-3, 2016.
|
6 |
T. hirokazu, O. iturou, Y. isaku, Linux kernel 2.6 structure and principles, Seoul, Hanbit Media Inc., pp. 460-503, 2007.
|
7 |
M. Tulloch, Microsoft Encyclopedia of Security, Redmond, Microsoft Press Pub., pp. 138-247, 2003.
|
8 |
J. Erickson, Hacking: the art of exploitation, 2nd Edition, Seoul, Acorn Pub, pp. 256-319, 2010.
|
9 |
L. Teo. (2000, December). Network Probes Explained: Understanding Port Scans and Ping Sweeps [Internet]. Available: http://www.linuxjournal.com/article/4234.
|
10 |
S. H. Kim, C. W. Yoon, Hacking and security, Seoul, youngjin.com Pub., pp. 50-251, 2003.
|
11 |
R. A. Grimes, Malicious mobile code, Sebastopol, O'Reilly Media, p. 312, 2001.
|
12 |
R. Rosen, Linux Kernel Networking-Implementation and Theory, Berkley, Apress Pub., 2014.
|
13 |
W. W. Gay, Linux socket programming by example, Indianapolis, Que Pub., pp. 118-120, 2000.
|
14 |
IETF Std. RFC 894, A Standard for the Transmission of IP Datagrams over Ethernet Networks, IETF, Charles Hornig, April 1984.
|