Browse > Article

인터넷 뱅킹 보안을 위한 웹 공격의 탐지 및 분류  

Park, Jae-Chul (전남대학교 정보보호학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 한국은행, '2008 1/4분기 국내 인터넷뱅킹서비스 이용현황', 한국인터넷진흥원, , 2008.7
2 Christopher Kruegel, and Giovanni Vigna, 'Anomaly detection of web-based attacks', In Proceedings of the 10th ACM conference on Computer and communications security CCS '03, ACM Press, 2003.10
3 Jaechul Park, and Bongnam Noh, 'Web Attack Detection: Classifying Parameter Information according to Dynamic Web page', International Journal of Web Services Practices, Vol.2 No.1-2:68-74, 2006
4 McAfee, Inc. 'Hacme Bank v2.0', , Foundstone Inc., 2008.7
5 Needleman, S. B., and Wunsch C. D., 'A general method applicable to the search for similarities in the amino acid sequence of two proteins', J. Mol. Biol., 48:443-453, 1970   DOI
6 Victor Chapela, 'Advanced SQL injection', OWASP, , 2005
7 William Yurcik, Samuel Patton, and David Dos, 'An achillesi heel in signature-based IDS: Squealing false positives in snort', In RAID '01, 2001
8 SNORT, 'Snort-The Open Source Network IDS', , 2008
9 Temple F. Smith, and Michael S. Waterman, 'Identification of Common Molecular Subsequences', Journal of Molecular Biology, 147:195-197, 1981   DOI
10 M. Roesch, 'Snort-lightweight intrusion detection for networks', In Proceedings of USENIX LISA'99, 1999
11 박용주, '인터넷뱅킹 보안사고 급증세', 연합뉴스, ,2007.8
12 Pete Finnigan, 'Oracle Security Step-by-step', SANS Institute, ,2002
13 김인순, 김용석, '흔들리는 전자금융 - 급증하는 보안 사고', 전자신문, , 2007.2
14 Andrews Mike, and Whittaker James A., 'How to break Web software : functional and security testing of Web applications and Web services', Addison-Wesley Professional, 2006
15 OWASP, 'Vulnerability', , 2008
16 M. Bykova, S. Ostermann, and B. Tjaden, 'Detecting network intrusions via a statistical analysis of network packet characteristics', In Proceedings of the 33rd Southeastern Symposium on System Theory, 2001
17 D. Aucsmith, 'Creating and maintaining software that resists malicious attack', Distinguished Lecture Series Atlanta, GA, 2004.9
18 Stuart McClure, Saumil Shah, and Shreeraj Shah, 'Web Hacking: Attacks and Defense', Addison- Wesley Professional, 2002.8
19 Eisenstein E., and Schachman H. K., 'Determining the roles of subunits in protein function', IRL Press, 1989
20 Dorothy E. Denning, 'An intrusion-detection model', IEEE Transactions on Software Engineering, 13(2):222-232, 1987   DOI   ScienceOn
21 OWASP, 'Top ten most critical web application vulnerabilities', , 2008