1 |
한국은행, '2008 1/4분기 국내 인터넷뱅킹서비스 이용현황', 한국인터넷진흥원, , 2008.7
|
2 |
Christopher Kruegel, and Giovanni Vigna, 'Anomaly detection of web-based attacks', In Proceedings of the 10th ACM conference on Computer and communications security CCS '03, ACM Press, 2003.10
|
3 |
Jaechul Park, and Bongnam Noh, 'Web Attack Detection: Classifying Parameter Information according to Dynamic Web page', International Journal of Web Services Practices, Vol.2 No.1-2:68-74, 2006
|
4 |
McAfee, Inc. 'Hacme Bank v2.0', , Foundstone Inc., 2008.7
|
5 |
Needleman, S. B., and Wunsch C. D., 'A general method applicable to the search for similarities in the amino acid sequence of two proteins', J. Mol. Biol., 48:443-453, 1970
DOI
|
6 |
Victor Chapela, 'Advanced SQL injection', OWASP, , 2005
|
7 |
William Yurcik, Samuel Patton, and David Dos, 'An achillesi heel in signature-based IDS: Squealing false positives in snort', In RAID '01, 2001
|
8 |
SNORT, 'Snort-The Open Source Network IDS', , 2008
|
9 |
Temple F. Smith, and Michael S. Waterman, 'Identification of Common Molecular Subsequences', Journal of Molecular Biology, 147:195-197, 1981
DOI
|
10 |
M. Roesch, 'Snort-lightweight intrusion detection for networks', In Proceedings of USENIX LISA'99, 1999
|
11 |
박용주, '인터넷뱅킹 보안사고 급증세', 연합뉴스, ,2007.8
|
12 |
Pete Finnigan, 'Oracle Security Step-by-step', SANS Institute, ,2002
|
13 |
김인순, 김용석, '흔들리는 전자금융 - 급증하는 보안 사고', 전자신문, , 2007.2
|
14 |
Andrews Mike, and Whittaker James A., 'How to break Web software : functional and security testing of Web applications and Web services', Addison-Wesley Professional, 2006
|
15 |
OWASP, 'Vulnerability', , 2008
|
16 |
M. Bykova, S. Ostermann, and B. Tjaden, 'Detecting network intrusions via a statistical analysis of network packet characteristics', In Proceedings of the 33rd Southeastern Symposium on System Theory, 2001
|
17 |
D. Aucsmith, 'Creating and maintaining software that resists malicious attack', Distinguished Lecture Series Atlanta, GA, 2004.9
|
18 |
Stuart McClure, Saumil Shah, and Shreeraj Shah, 'Web Hacking: Attacks and Defense', Addison- Wesley Professional, 2002.8
|
19 |
Eisenstein E., and Schachman H. K., 'Determining the roles of subunits in protein function', IRL Press, 1989
|
20 |
Dorothy E. Denning, 'An intrusion-detection model', IEEE Transactions on Software Engineering, 13(2):222-232, 1987
DOI
ScienceOn
|
21 |
OWASP, 'Top ten most critical web application vulnerabilities', , 2008
|