1 |
Martin Roesch, 'Snort-Lightweight Intrusion Detection for Networks,' Proceedings of the LISA, 1999
|
2 |
Brian Laing, Jimmy Alderson, How to Guide: Implementing a Network Based Inrusion Detection System, Internet Security System, 2000
|
3 |
이현우, 이상엽, 정현철, 정윤종, 임채호, 'Analysis of Large Scale Network Vulnerability Scan Attacks and Implementation of The Scan-Detection Tool,' 1999
|
4 |
브라질 사이버테러 정보보호 현황 및 대응기구, 국가사이버안전센터, Monthly 사이버 시큐리티 1월호
|
5 |
Cristine Hoepers, Klaus Steding-Jessen, Luiz E. R. Cordeiro and Marcelo H. P. C. Chaves, 'A National Early Warning Capability Based on a Network of Distributed Honeypots,' 17th Annual FIRST Conference on Computer Security Incident Handling, 2005
|
6 |
Tillmann Werner, Honeytrap: Trap Attacks against TCP Services, http://honeytrap.sourceforge.net
|
7 |
Know Your Enemy: Honeynets, http://www.honeynet.org, 2005
|
8 |
김익수, 김명호, '사용되지 않는 포트를 이용하여 해커를 허니팟으로 리다이렉트하는 시스템 설계 및 구현,' 한국정보보호학회논문지, 16(5), pp. 15-24, October 2006
과학기술학회마을
|
9 |
John G. Levine, Julian B. Grizzard, Henry L. Owen, 'Using Honeynets to Protect Large Enterprise Networks,' IEEE Security and Privacy, 2, pp. 74-75, 2004
|
10 |
Miyoung Kim, Misun Kim, Youngsong Mun, 'Design and Implementation of the HoneyPot System with Focusing on the Session Redirection,' Proceedings of the ICCSA, 3043, pp. 262-269, May 2004
|
11 |
L. Spitzner, Know Your Enemy: Sebek2 A Kernel Based Data Capture Tool, http://www.honeynet.org, 2003
|
12 |
L. Spitzer, Honeypots: Tracking Hackers, Addison-Wesley, 2002
|
13 |
Xing-Yun He, Knok-Yan, Siu-Leung Chung, Chi-Hung Chi, Jia-Guang Sun, 'Real-Time Emulation of Intrusion Victim in HoneyFarm,' Proceedings of the AWCC, 3309, pp. 143-154, Nov 2004
|
14 |
Know Your Enemy: Honeywall CDROM, http://www.honeynet.org, 2004
|