1 |
Chung Hyun-Chul, 'An analysis report of the Sscan,' Technical Report of KISA, 1999
|
2 |
http://security.xmecca.com/AnalyzingNmap.pdf
|
3 |
Martin freiss, 'Protecting Networks with SATAN,' O'REILLY, 1998
|
4 |
http://www.nessus.org/
|
5 |
Kim Sang-Jung, 'An analysis report of the Mscan,' Technical Report of the Korea Information Security Agency(KISA), 1998
|
6 |
J. K. Ousterhout, Tcl and the Tk Toolkit, Addison-Wesley Professional Computing Series (1994)
|
7 |
Fyodor, 'The Art of Port Scanning' Phrack Magazine Volume 7, Issue 51, article 11 of 17, 1997
|
8 |
Park Hyun-Mi, Oh Eun-Suk, Lee Dong-Ryun, 'Technique of IP Network Scanning,' Technical Report of KISA, 2002
|
9 |
Guo Xiaobing, Qian Depei, Liu Min, Zhang Ran, Xu Bin, 'Detection and Protection against Network Scanning: IEDP,' Proc. of the 2003 IEEE International Conference on Computer Networks and Mobile Computing, pp. 487-493, 16-19 Oct. 2001
DOI
|
10 |
Lee Hyun-Woo, Lee Sang-Yeop, Chung Hyun-Chul, Chung Yoon-Jong, Lim Chae-Ho, 'Pattern analysis and detection tools against scan attack to network vulnerability,' WISC, 1999
|
11 |
http://www.ccrtcc.or.kr/
|
12 |
S. McCanne, C. Leres and V. Jacobson, Libpcap, available via anonymous ftp to ftp.ee.lbl.gov, 1994
|
13 |
Martin Roesch, 'Snort-Lightweight Intrusion Detection for Networks,' Proc. of LISA '99: 13th Systems Administration Conference, Seattle, Washington, USA, November 7-12, 1999
|
14 |
http://www.snort.org/
|
15 |
Hoagland, J.A, Staniford, S, 'Viewing IDS alerts: lessons from SnortSnarf,' Proc. of the 2001 IEEE DISCEX '01 on DARPA Information Survivability Conference & Exposition II, pp. 374-386, 12-14 June 2001
DOI
|
16 |
http://www.psionic.com/
|
17 |
David Sarmanian, 'Deploying PortSentry-A Simple and Free Barrier From Inside Hackers,' http://www.giac.org/practical/gsec/David_Sarmanian_GSEC.pdf
|