Browse > Article

보안도구에 대한 우회공격 기법 분류 및 분석  

손태식 (고려대학교 정보보호대학원)
서정우 (고려대학교 정보보호대학원)
구원본 (고려대학교 정보보호대학원)
민동옥 (고려대학교 정보보호대학원)
문종섭 (고려대학교 정보보호대학원)
박현미 (한국정보보호진흥원)
이병권 (한국정보보호진흥원)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 /
[ Eric Hacker ] / Re-synchronizing a NIDS
2 /
[ Comer,D.E. ] / Internetworking with TCP/IP Volume One.
3 /
[ Fred Cohen ] / 50 ways to defeat your intrusion Detection System
4 /
[ Coretez Giovanni ] / Passive Mapping: Anoffensive use of IDS
5 Loki: ICMP Tunneling, daemon9 /
[] / Phrack Magazine
6 LOK12 (the implementation) /
[ route ] / Phrack Magazine
7 /
[ Francois Rene Rideau ] / Firewall Piercing mini-HOWTO
8 Defeating Solar Designer Non-Executable Stack Patch /
[ Refel Wojtczuk ] / Bugtraq mailing list
9 /
[ Kevin Timm ] / IDS Evasion Techniques and Tactics
10 /
[ Thomas,H.Ptacek;Timothy,N.Newsham ] / Inserti on. Evasion. and Denial of Service: Eluding Network Intrusion Detection
11 /
[ TIS Committee ] / Tool Interface Standard(TIS) Executable and Linking Format(ELF) Specification V.1.2
12 Nasty security hole in lprm /
[ Chris Evans ] / Bugtraq mailing list
13 Phrack Magazine Issue 49 Article 6 /
[ route ] / Phrack Magazine
14 /
[ Steven Martin ] / Anti-IDS Tool and Tactics
15 /
[ Eric Hacker ] / IDS Evasion with Unicode
16 /
[ T.Ptacek;T.Newsham ] / Secure Networks Insertion, Evasion, and Denial of Service:Eluding Network Intrusion Detection
17 /
[ Solar Designer ] / Non-Executable User Stack
18 /
[ Nothan,P.Smith ] / Stack Smashing vulnerabilities in the UNIX Operating System
19 /
[ Vern Paxson;Mark Handley ] / Defending Against NIDS Evasion using Traffic Normalizers
20 /
[ Toby Miller ] / Social Engineering: Techniques that can bypass Intrusion Detection Systems
21 Defeating Sniffers and Intrusion Detection Systems /
[ horizon ] / Phrack Magazine
22 /
[ Greg Hoglund;Jon Gray ] / Multiple Levels of De-synchronization and other concerns with testing an IDS system
23 /
[ Van Hauser ] / Placing Backdoors Throught Firewalls