Development of Traffic Centralized Control System Based on Protocol Redirection for DB Protection |
Su, Yang-Jin
(소프트 캠프(주) 정보보안기술연구소)
Lee, Jae-Pil (소프트 캠프(주)) Park, Cheon-O ((주)피앤피씨큐어) Lee, Deok-Gyu (ETRI 지식정보보호연구부) Chang, Hang-Bae (대진대학교 경영학과) |
1 | Sairam A.S. and Barua G., "Distributed route control schemes to load balance incoming traffic in multihomed stub networks," Communications(NCC), pp. 1-5, 2010 |
2 | 오승희, 남택용, 손승원, "네트워크 보안 동향," [IITA] 정보통신연구진흥원 학술정보. |
3 | 오행석, 김정녀, 손승원, "차세대 네트워크 보안표준화," 대한전자공학회, 전자공학회논문지, 제43권, TC편 제7호, pp. 122-13, 2006. 과학기술학회마을 |
4 | 서정택, 윤주범, 임을규, 이철원, "네트워크 보안시뮬레이터에 관한 연구," 한국정보과학회, 한국정보과학회 2002년도 가을 학술발표논문집, 제29권, 제2호(I), pp. 475-477. 2002. |
5 | Bishop M. and Bailey D., "A Critical Analysis of Vulnerability Taxonomies," Technical Report CSE-96-11, Dept. of Computer Science, University of California at Davis, 1996. |
6 | Brian Marick, "A Survey of Software Fault Surveys," Technical Report UIUCDCS-R-90-1651, University of Illinois at Urbana-Champaign, 1990. |
7 | Eugene H. Spafford, "Common System Vulnerabilities," Proceedings of the Workshop on Future Directions in Computer Misuse and Anomaly Detection, 1992. |
8 | Howard JD. "An Analysis of Security Incidents on the Internet," Ph. D Thesis, Carnegie Mellon University, 1997. |
9 | Lee, Y. H. and Hwang, D. J., "Design and Implementation of Agent Based Dynamic Digital Rights Management," Journal of Information Processing Association, D. Vol.8D, No.5, pp.613-622, October 2001 |
10 | Lai, D. and Zhongwei Zhang, "Improving Efficiency and Scalability of Service Network Graph by Re-routing Service Routes," Intelligent Information and Database Systems, pp. 414-419, 2009. |