1 |
S.-C. Seo, N.-Y. Ko, "A traffic analysis of Gigabit Ethernet high-speed network design," Journal of the Korea Institute of Information and Communication Engineering, vol. 6, no. 1, pp.48-54, Feb. 2002.
|
2 |
J.-H. Kim, M.-S Kim, "Research on Traffic Classification based on DNS Packet Analysis," Korean Network Operations and Management Review, vol. 13, no. 2, Oct. 2010
|
3 |
Y.-H. Goo, S.-O. Choi, S.-K. Lee, S.-M. Kim, M.-S. Kim, "A Method for Tracking the Source of Cascading Cyber Attack Traffic Using Network Traffic Analysis," The Journal of Korean Institute of Communications and Information Sciences '16-12, vol. 41 no.12, Dec. 2016.
|
4 |
K.-S. Shim, S.-H. Yoon, M.-S. Kim, "The Payload Signature Management System for Network Management on Real-Time," in Proceedings of Korean Information and Communications Society, the summer conference 2015, Ramada Plaza, Jeju, Jun. 23-25, 2015.
|
5 |
A. Hashmi, H. Berry, O. Temam, and M. Lipasti, "IP traceback based on packet marking and logging," in Proceedings of 2005 IEEE International Conference on Communications, Seoul, South Korea, 2005.
|
6 |
B. K. Kim, S. Y. Yoon, J. T. Oh, and J. S. Jang, "High-Performance Intrusion Detection Technology in FPGA-Based Reconfiguration Hardware," ETRI Electronics and Telecommunications Trends, vol. 22, no. 1, pp. 51-58, Feb. 2007.
|
7 |
Vaddempudi Srinidhi, "Classification of User Behaviour in Mobile Internet", Asia-pacific Journal of Convergent Research Interchange, Asia-pacific Journal of Convergent Research Interchange, vol. 2, no. 2, June (2016), pp. 9-18
|
8 |
J.-H. Sung, K.-H. Kim, T.-G. Kwon, B.-T. Kim, "Efficient Contents Filtering Algorithm with TCAM," in Proceedings of Joint Conference on Communications and Information 2005.
|
9 |
B.-H. Chung, S.-H Ryu, J.-D. Lim, Y.-H. Kim, K.-Y Kim, Intrusion detection method in network system, KR100656403B1, 2006.
|
10 |
Y.-H. Goo, K.-S. Shim, S.-H. Lee, Baraka D. Sjia, M.-S. Kim, "Traffic-Classification Method Using the Correlation of the Network Flow," Journal of Korean Institute of Information Scientists and Engineers, vol. 44, no. 4, pp. 433-438, Apr. 2017.
|
11 |
Y.-H. Goo, S.-H. Lee, K.-S. Shim, W.-S. Jung, S.-M. Kim, M.-S. Kim, "Multi-demensional Application Traffic Analysis using Flow Characteristic," in Proceedings of Korean Information and Communications Society Winter Conference 2017, High1 Resort, Kangwon, Jan. 18-20, 2017.
|
12 |
The industry-standard windows packet capture library [Internet].Available: https://www.winpcap.org/.
|
13 |
Snort [Internet]. Available: https://www.snort.org/.
|