1 |
2010 White paper of National Information Security, KISA, 2010.
|
2 |
2011 White paper of National Information Security, KISA, 2011.
|
3 |
3.4 DDoS Special report, Ahnlab, 2011.
|
4 |
Jin-tae Oh, et al., "A Novel Application-Layer DDoS Attack Detection Algorithm based on Client Intention", Journal of the KIISC(Korea Institute of Inforamtion Security and Cryptology), Vol.21, No.1, pp.39-52, 2011.
과학기술학회마을
|
5 |
Tai-jin Lee, et al., "Light-weight Defense Mechanisms for application layer DDoS Attacks in the Web Services", Journal of the KIISC, Vol.20, No.5, pp.99-110, 2010.
과학기술학회마을
|
6 |
Ki-Hun Jang, et al., "Smartphone DDoS Attack trend", Review of KIISC, Vol.21, No.5, pp.65-70, 2011.
과학기술학회마을
|
7 |
Yong-Hee Jeon, et al., "Classification of DDoS Attack and Response techniques", Review of KIISC, Vol.19, No.3, 2009.
과학기술학회마을
|
8 |
The lastest DDoS Attack and Defense techniques, Ahnlab, 2010.
|
9 |
Dustin D. Trammell & Todd Manning, "Simulating Distributed Denial of Service with BreakingPoint Storm CTM", White Paper, BreakPoint Systems.
|
10 |
Jelena Mirkovic, Peter Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms", ACM SIGCOMM Computer Communication Review, Vol.34, Issue 2. ISSN:0146-4833, April, 2004.
|
11 |
Wikipedia, http://ko.wikipedia.org/
|