1 |
S. Staniford-Chen and L. T. Heberlein. 'Holding Intruders Accountable on the Internet,' In Proceedings of the 1995 IEEE Symposium on Security and Privacy, pp.39-49, 1995
DOI
|
2 |
Y. Zhang and V. Paxson, 'Detecting Stepping Stones,' Proceedings of 9th USENIX Security Symposium, pp.171-184, 2000
|
3 |
최양서, 서동일, 손승원, '역추적 기술 동향(TCP Connection traceback 중심)', ETRI 주간 기술 동향, 제1079호, pp13-25. 2003
|
4 |
최양서, 김환국, 서동일, 이상호, 'Connection Redirection 기법을 이용한 네트워크기반 실시간 연결 역추적 시스템의 설계', COMSW2003, pp.115-119, 2003
|
5 |
H. T. lung et al. 'Caller Identification System in the Internet Environment,' Proceedings of the 4th Usenix Security Symposium, pp.69-73, 1993
|
6 |
Chaeho Lim, 'Semi-Auto Intruder Retracing Using Autonomous Intrusion Analysis Agent,' FIRST Conference on Computer Security Incident Handling & Response 1999, 1999
|
7 |
X. Wang, D. Reeves, S. F. Wu, and J. Yuill, 'Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework,' Proceedings of IFIP Conference on Security, pp.369-384, 2001
|
8 |
Yangseo Choi, Dongil Seo, Seungwon Sohn, Sangho Lee, 'Network-Based Real-Time Connection Traceback System(NRCTS) with Packet Marking Technology,' In Proceedings of the 2003 International Conference on Computational Science and Its Applications, pp.31-40, 2003
|
9 |
K. Yoda and H. Etoh, 'Finding a Connection Chain for Tracing Intruders,' 6th European Symposium on Research in Computer Security-ESORICS 2000 LNCS -1985, pp.191-205, 2000
|