A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment |
Baek, Yong-Jin
(Department of Computer Science, Gyeongsang National University)
Jeong, Won-Chang (Department of Computer Science, Gyeongsang National University) Hong, Suk-Won (Department of Computer Science, Gyeongsang National University) Park, Jae-Hung (Department of Computer Science, Gyeongsang National University) |
1 | C-C. Park, G-H. Park, S-H. Kim, and S-H. Koh, "The proposal of evaluation measure from hospital information system : The case study of C national university hospital in Korea", Journal of The Korea Knowledge Information Technology Systems, Vol. 2, No. 2, pp. 69-77, 2007. |
2 | J-H. Choi, "Analysis of changes in the muscle activity and fatigue of the erector spinae using IT convergent type medical equipment", Journal of Knowledge Information Technology and Systems, Vol. 10, No. 6, pp. 665-673, 2015. |
3 | S-K. Park, "A study on the regional differences of telemedicine and digital divide", Journal of the Korean Geographical Society, Vol. 50, No. 3, pp. 325-338, 2015. |
4 | J-J. Hoon, "A study on the vulnerability and corresponding technique trends of the cloud computing service", Convergence security journal, Vol 13, No. 6, pp. 17-24, 2013. 4. |
5 | J-K. Park, "A study on measures to active cultural contents service in big data age", Vol. 20, No. 1, pp. 324-334, Mar. 2014. |
6 | Q. Miao, "When intelligence meeting wity big data : Review and perceptions of big Data'S hotspot intelligence tracking", Institute of Scientific & Technical Information of Shanghai,Shanghai 200031, No. 5, Serial No. 187, 2013. |
7 | S-Y. Kim, J-I. Lim, and K-h. Lee, "A study on the security policy improvement using the big data, Korea University", Graduate School of Information Security, Vol. 23, No. 5, pp. 969-976, 2013, http://dx.doi.org/10.13089/JKIISC.2013.23.5.96, 2013. |
8 | M-H. Kim, B-H. Chul, H-S. Won, and J-H. Park, "An Encrypted Service Data Model for Using Illegal Applications of the Government Civil Affairs Service under Big Data Environments", Convergence security journal, Vol 15, No. 7, pp. 31-38, 2015. 12. |
9 | S. Bellovin, M. Leech, and T. Taylor, "ICMP Traceback message", IETF, draft-ietfitrace-04, Feb. 2003. |
10 | Y-Y. Mu, H-C. Baek, J-Y. Choi, W-C. Jeong, and S-B. Kim, "A proposal of a defense model for the abnormal data collection using trace back information in big data environments", Journal of Knowledge Information Technology and Systems, Vol. 10, No. 2. pp. 753-162, 2015. |
11 | S-P. Huh, D-S. Lee, K-N. Kim, "A Study on The Improvement of User Authentication using the Facial Recognition and OTP Technique in the Mobile Environment", Convergence security journal, Vol 11, No. 3, pp. 75-84, 2011. 6. |