Browse > Article

침입방지시스템(IPS)의 기술 분석 및 성능평가 방안  

Jeon Yong-Hee (대구가톨릭대학교 공과대학 컴퓨터정보통신공학부)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 권혁범, 네트워크타임즈, 침입방지시스템(IPS). 2003년 9월
2 Greg Shipley. Don't Get Bitten by NIPSHype.http//www.nwc.com/1411/1411colshipley.html
3 An NSS Group Report V 1.0. Intrusion Prevention SystemsOPS). Group Test. NSS. Jan. 2004
4 A White Paper by NetScreen Techno logies Inc. Intrusion Detection and Preven tion: Protecting your networkfrom attacks. version 2.0.http//www.netsccreen.com
5 정보흠, 김정녀, 손승원, '침입방지시스템 기술 현황 및 전망'. 주간기술동향 통권 1098호, 2003.6.3
6 Andrew Conry-Murray. Emerging Technology: Detection vs. Prevention - Evolution or Revolution?, http://www.networkmagazine.com/shared/article/showarticle.jhtml?articleid=9400017.May 2003
7 Pete Lindstrom, Intrusion Prevention Systems (IPS) : Next Generation Firewalls. A Spire Research Report. Spire Security. March. 2004
8 Gary Golomb, IDS v . IPS Commentary, Linuxsecurity.com News, 6/16/2003, http://www.linuxsecurity.com/articles/forums_article-7476.html
9 Eric Ahlm, Is Intrusion Prevention Changing Information Security', Rev. Ver, 1.1, March 2004, Vigilar Inc
10 Neil Desai. Intrusion Prevention Systems: the Next Step in the Evolution of IDS, http://www.securityfocus.com/printable/infocus/1670, Feb. 2003
11 Steve Taylor and Joanie Wexler. IDS vs.IPS: Is one strategy 'better?' Network World Wide Area Networking Newsletter.10/16/03. http//www.nwfusion.com/newslettters/frame/2003/1013wan2.html
12 Top Layer White Paper. Beyond IDS Essentials of Network Intrusion Prevention. pp.1-18 Nov. 2002
13 Leon Erlanger, Ten Tips for evaluating and deploying IPS and IDS, http://www.infoworld.com/article/04/03/12/11FEidstips_1.html
14 Ian Poynter and Brad Doctor. Beyond the firewall: The next level of network security. StillSecure. Jan. 2003
15 신승원, 강동호, 김기영, 장종수, 'DPI 기술 분석', 전자통신동향분석, 제 19 권 제 3 호, pp117-124, 2004년 6월
16 Carl Endorf. Jim Mellander and Eugene Schultz, Intrusion Detection and Prevention, Osborne Computer Books, Jan. 2004
17 Mitchell Ashley, Layered Network Security: A best-practices approach, StillSecure White Paper, Jan, 2003