1 |
Eric Ahlm, Is Intrusion Prevention Changing Information Security?, Rev. Ver. 1.1, March 2004, Vigilar Inc
|
2 |
A White Paper by NetScreen Technologies Inc., Intrusion Detection and Prevention: Protecting your network from attacks, version 2.0, http://www.netscreen.com
|
3 |
ITU-T X.805 Rec., Security architecture for systems providing end-toend communications
|
4 |
Cisco Systems, White Papers, Security of the MPLS Architecture, Cisco Systems Inc
|
5 |
Top Layer White Paper, Beyond IDS: Essentials of Network Intrusion Prevention, pp.1-18, Nov. 2002
|
6 |
정보통신부 BcN 구축 기본 계획(2. 통합망 보안기능 고도화), pp76-83, 2004년 2월, 한국 전산원
|
7 |
B. Gamm, B. Howard, O. Paridaens, 'Security features required in an NGN', Alcatel Telecommunications Review, 2nd Quarter 2001, pp.129-133
|
8 |
A. Striegel, 'Security Issues in a Differentiated Services Internet', http://ww w.ee.iastate.edu/~gmani/tiw-2002/ diffserv-security. pdf
|
9 |
'Telecommunications and Internet Protocol Harmonization over Networks(TIPHON) Security; Threat Analysis', DTR/ TIPHON - 08002 V0.1.9 (2001-02-09)
|
10 |
Chun K. Chan, Uma Chandrashekhar, Steven H. Richman, and S. Rao Vasireddy, 'The Role of SLAs in Reducing Vulnerabilities and Recovering from Disasters', Bell Labs Tech. Journal, 9(2), pp.189-203, 2004
DOI
ScienceOn
|
11 |
Tsung-Li Wu, S. Felix Wu, Zhi Fu, He Huang, Feng-Min Gong, 'Securing QoS: Threats to RSVP Messages and their Countermeasures', http://citeseer.ist.psu. edu/wu99securing.html
|
12 |
Ian Poynter and Brad Doctor, Beyond the firewall: The next level of network security, StillSecure, Jan. 2003
|
13 |
서동일, 김광식, 장종수, 손승원, 'IT 839 전략 추진을 위한 정보보호 기술개발 방향', 한국전자 통신연구원 전자통신동향분석 제 20권 제 1호, 2005년 2월
|
14 |
Evdoxia Spyropoulou, Timothy E. Levin, and Cynthia E. Irvine, Calculating costs for quality of security service, In Proc. of the 16th Annual Computer Security Applications Conference, pp. 334-343, New Orleans, Louisiana, USA, Dec. 11-15, 2000
|
15 |
Neil Desai, Intrusion Prevention Systems: the Next Step in the Evolution of IDS, http://www.securityfocus.com/ printable/infocus /1670, Feb. 2003
|
16 |
Stefan Lindskog, Erland Jonsson, 'Introducing Security in QoS Architectures', http://www.ida.his.se/ida/conf/ PromoteIT2002/5D3LindskogStefan.pdf
|
17 |
Carl Endorf, Eugene Schultz, and Jim Mellander, Intrusion Detection & Prevention, McGraw-Hill, 2004
|