1 |
유승엽, 박동규, 오진태, 전인오, "ALADDIN의 어플리케이션 계층 공격 탐지 블록 ALAB 알고리즘의 최적 임계값 도출 및 알고리즘 확장", 정보처리학회지 제18-C권 제 3호, 2011
|
2 |
유승엽, 박동규, 장종수, "URI 및 브라우저 행동 패턴의 특성을 이용한 HTTP get flooding 공격 탐지 알고리즘", 한국정보기술학회지 제9권 제1호 159p-170p, 2011
|
3 |
Markus J, Zulfikar R., "Crimeware: Understanding New Attacks and Defenses", Addison Wesley Professional, ISBN 0-321-50195-0, April 2008.
|
4 |
Tuncer, T. and Tatar, Y. 2008 Detection SYN Flooding Attacks Using Fuzzy Logic. Proc. Int. Conf. Information Security and Assurance ISA'08, Washington, DC, USA, April 24-26, p. 321-325. IEEE Computer Society, NewYork, NY, USA
|
5 |
U.Payer, M.Lamberger, and P.Teufl. Hybrid engine for polymorphic code detection. In Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment, pages 19-31
|
6 |
Takeshi Yatagai, et al., "A HTTP Flooding Detection Method Based on Browser Behavior", 2007.
|
7 |
Jinghe Jin, Nazarov Nodir, Chaetae Im, and Seung Yeob Nam, "Mitigating HTTP GET Flooding Attacks through Modified NetFPGA Reference Router", 1st Asia NetFPGA Developers Workshop, Daejeon, Korea, June 14, 2010.
|
8 |
KINDER, J., KATZENBEISSER, S., SCHALLHART, C., and VEITH, H. "Detecting Malicious Code by Model Checking" In Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 2005.
|
9 |
TADAO MURATA, "Petri Nets:Properties, Analysis and Applications", PROCEEDING OF THE IEEE, VOL. 77, NO. 4, APRIL 1989
|
10 |
D.A.Zaitsev, T.R.Shmeleva, "Simulating of Telecommunication Systems with CPN Tools", Nov. 2006
|
11 |
http://www.cpntools.org/
|