Browse > Article

분석 사례를 통해 본 네트워크 포렌식의 동향과 기술  

Kim, Hyuk-Joon (고려대학교 정보경영공학전문대학원)
Lee, Sang-Jin (고려대학교 정보경영공학전문대학원)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Robert, J. (2005). Internet Forensics, p. 1-8 O'Reilly Media, Inc
2 Shimoura, T. (1996). Takedown. New York, Hyperion Press
3 The Honeynet Project & Research Alliance (2007) Fast-Flux Service Networks. Know Your Enemy
4 Whitcomb, D. (2006). Botmaster pleads guilty to computer crime. Reuters. LOS ANGELES
5 Bejtlich, R. (2004). The Tao Of Network Security Monitoring: Beyond Intrusion Detection, p. 76-83 Addison-Wesley Professional
6 Jones, K. J., R. Bejtlich, et al. (2005). Real Digital Forensics: Computer Security and Incident Response, p. 597-607 Addison-Wesley Professional
7 Nazario, J. (2007). 'Storm is Back, Dude!' ARBOR Security Engineering & Rerponse Tt, from http://asert.arbornetworks.com/2007/12/storm-is-back-dude/
8 Bejtlich, R. (2005). Extrusion Detection: Security Monitoring for Internal Intrusions, p. 83-84 Addison-Wesley Professional
9 Porras, P., H. Saidi, et al. (2007). A Multi-perspective Analysis of the Storm (Peacomm)Worm
10 Ramachandran, A., N. Feamster, et al. (2006). Revealing botnet membership using DNSBL counter-intelligence. Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet - Volume 2. San Jose, CA, USENIX Association