1 |
Farmer, D. and W. Venema, 'Security Administrator Tool for Analyzing Networks,' http://www.fish.com/satan
|
2 |
Baldwin, R. W., 'Rule-Based Analysis of Computer Security,' Massachusetts Institute of Technology, Cambridge, MA, june 1987
|
3 |
이재승, 김상춘, 이종태, 김경범, 손승원, '대규모 네트워크 환경하에서의 침해사고 예방을 위한 보안평가 시스템 설계,' 제12회 정보보호와 암호에 관한 학술대회(WISC2000), 160-176, 2000. 9
|
4 |
한국전산원, 정보시스템 보안을 위한 위험분석 소프트웨어 개발 보고서, 1997
|
5 |
S. W. Kim, H. J. Jang and B. Park, 'Dynamic Monitoring based on Security Agent,' Proceedings of the 10th Workshop on Information Security and Cryptography, pp.518-530, 1998
|
6 |
Larry J. Hughes, Jr., Actually Useful Internet Security Techniques, New Riders Publishing, 1995
|
7 |
Simson Garfinkel & Gene Spafford, Practical UNIX & Internet Security, O'REILLY, Second Edition
|
8 |
Sundaram Aurobindo, 'An Introduction to Intrusion Detection,' ACM CROSSROADS Issue2.4, 1996.4
|
9 |
Daniel Farmer, Eugene H. Spafford, 'The COPS Security Checker System,' Purdue University Technical Report CSD-TR-993, Jan 1994
|
10 |
Symantec Enterprise Solutions Home Page, http://enterprisesecurity.symantec.com
|
11 |
Nessus Project Home Page, http://www.nessus.org/
|
12 |
ISS, 'Securing Operating Platforms: A Solution for tightening system security,' January 1997
|
13 |
ISS Vulnerability Assessment Products Home Page, http://www.iss.net/products_services/enterprise_protection/vulnerability_assessment/index.php
|
14 |
Shostack, A., S. Blake., 'Toward a Taxonomy of Network Security Assessment Techniques,' Proceedings of the 1999 Black Hat Briefings, July 1999
|
15 |
S. J. Shin, J. W. Yoo and B. M. Lee, 'A Prototype Design of Expert System for Automated Risk Analysis tool,' Proceedings of the 10th Workshop on Information Security and Cryptography, pp. 383-395, 1998
|
16 |
ISS, 'Network and Host-based Vulnerability Assessment,' http://documents.iss.net/whitepapers/nva.pdf
|