Browse > Article

BcN 인프라 정보보호  

전용희 (대구가톨릭대학교 공과대학 컴퓨터정보통신공학부)
장종수 (한국전자통신연구원 정보보호연구단 네트워크보안그룹)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Eric Ahlm, Is Intrusion Prevention Changing Information Security?, Rev. Ver. 1.1, March 2004, Vigilar Inc
2 A White Paper by NetScreen Technologies Inc., Intrusion Detection and Prevention: Protecting your network from attacks, version 2.0, http://www.netscreen.com
3 ITU-T X.805 Rec., Security architecture for systems providing end-toend communications
4 Cisco Systems, White Papers, Security of the MPLS Architecture, Cisco Systems Inc
5 Top Layer White Paper, Beyond IDS: Essentials of Network Intrusion Prevention, pp.1-18, Nov. 2002
6 정보통신부 BcN 구축 기본 계획(2. 통합망 보안기능 고도화), pp76-83, 2004년 2월, 한국 전산원
7 B. Gamm, B. Howard, O. Paridaens, 'Security features required in an NGN', Alcatel Telecommunications Review, 2nd Quarter 2001, pp.129-133
8 A. Striegel, 'Security Issues in a Differentiated Services Internet', http://ww w.ee.iastate.edu/~gmani/tiw-2002/ diffserv-security. pdf
9 'Telecommunications and Internet Protocol Harmonization over Networks(TIPHON) Security; Threat Analysis', DTR/ TIPHON - 08002 V0.1.9 (2001-02-09)
10 Chun K. Chan, Uma Chandrashekhar, Steven H. Richman, and S. Rao Vasireddy, 'The Role of SLAs in Reducing Vulnerabilities and Recovering from Disasters', Bell Labs Tech. Journal, 9(2), pp.189-203, 2004   DOI   ScienceOn
11 Tsung-Li Wu, S. Felix Wu, Zhi Fu, He Huang, Feng-Min Gong, 'Securing QoS: Threats to RSVP Messages and their Countermeasures', http://citeseer.ist.psu. edu/wu99securing.html
12 Ian Poynter and Brad Doctor, Beyond the firewall: The next level of network security, StillSecure, Jan. 2003
13 서동일, 김광식, 장종수, 손승원, 'IT 839 전략 추진을 위한 정보보호 기술개발 방향', 한국전자 통신연구원 전자통신동향분석 제 20권 제 1호, 2005년 2월
14 Evdoxia Spyropoulou, Timothy E. Levin, and Cynthia E. Irvine, Calculating costs for quality of security service, In Proc. of the 16th Annual Computer Security Applications Conference, pp. 334-343, New Orleans, Louisiana, USA, Dec. 11-15, 2000
15 Neil Desai, Intrusion Prevention Systems: the Next Step in the Evolution of IDS, http://www.securityfocus.com/ printable/infocus /1670, Feb. 2003
16 Stefan Lindskog, Erland Jonsson, 'Introducing Security in QoS Architectures', http://www.ida.his.se/ida/conf/ PromoteIT2002/5D3LindskogStefan.pdf
17 Carl Endorf, Eugene Schultz, and Jim Mellander, Intrusion Detection & Prevention, McGraw-Hill, 2004