1 |
Brian Laing, Jimmy Alderson, How to Guide: Implementing a Network Based Inrusion Detection System, Internet Security System, 2000
|
2 |
Joseph Reves, Sonia Panchen, Traffic Monitoring with Packet-Based Sampling for Defense against Security Threats
|
3 |
브라질 사이버테러 정보보호 현황 및 대응기구, 국가사이버안전센터, Monthly 사이버 시큐리티 1월호
|
4 |
Martin Roesch, 'Snort-Lightweight Intrusion Detection for Networks', Proceedings of the LISA, 1999
|
5 |
L. Spitzer, Honeypot Farms, http://www.securityfocus.com/infocus/1720, 2003
|
6 |
L. Spitzner, Know Your Enemy: Sebek2 A Kernel Based Data Capture Tool, http://www.honeynet.org, 2003
|
7 |
Miyoung Kim, Misun Kim, Youngsong Mun, 'Design and Implementation of the HoneyPot System with Focusing on the Session Redirection', Proceedings of the ICCSA, 3043, pp. 262-269, May 2004
|
8 |
A. Machie, R. Russell, Code Red Worm, Security Focus, Tech. Rep, Incident Analysis, 2001
|
9 |
L. Spitzer, Honeypots: Tracking Hackers, Addison-Wesley, 2002
|
10 |
A. Machie, J. Roculan, R. Russell, M. V. Velzen, Nimda Worm Analysis, Security Focus, Tech. Rep, Incident Analysis, 2001
|
11 |
Xing-Yun He, Knok-Yan, Siu-Leung Chung, Chi-Hung Chi, Jia-Guang Sun, 'Real-Time Emulation of Intrusion Victim in HoneyFarm,' Proceedings of the AWCC, 3309, pp. 143-154, Nov 2004
|
12 |
John G. Levine, Julian B. Grizzard, Henry L. Owen, 'Using Honeynets to Protect Large Enterprise Networks,' IEEE Security and Privacy, 2, pp. 74-75, 2004
|