1 |
한국정보보호진흥원, "2007년 악성 봇 현황 및 2008년 악성 봇 전망", 정보보호뉴스, Vol 124, pp. 14-15, Jan. 2008
|
2 |
Ryan Vogt and John Aycock, "Attack of the 50 Botnet", Dept. of Computer Science, University of Calgary, TR 2006-840-33, Aug. 2006
|
3 |
Jeff Carpenter, Chad Dougherty and Shawn Hernan,:"Continuing Threats to Home Users", CERTAdvisory CA-2001-20. Jan. 2001
|
4 |
Moheeb Abu Rajab et al., "A Multifaceted Approach to Understanding the Botnet Phenomenon", IMC'06, Oct. 2006, Brazil
|
5 |
Julian B. Grizzard et al., "Peer-to-Peer Botnets: Overview and Case Study", http://www.usenix.org/event/hotbots07/tech/full_papers/grizzard/griz
|
6 |
Ramneek Puri, Bots & Botnet:An Overview, GSEC Practical Assignment Version 1.4b, Aug. 2003, SANS Institute
|
7 |
Jones Jim, FEDCIRC, "BotNets:Detection and Mitigation", Feb. 2003. http://www.fedcirc.gov/library/documents/botNetsv32.dco
|
8 |
Jianwei Zhuge et al., "Characterizing the IRCbased Botnet Phenomenon", Reihe Informatik, TR-2007-010, Dec. 2007
|
9 |
Nicholas Albright, Researching Botnets, HTTP 자료
|