1 |
TTA, Telecommunications Technology Terms Dictionary, http://terms.tta.or.kr/dictionary/dictionaryView. do?word_seq=057943-2 (accessed January, 2, 2019).
|
2 |
Do-Won Kim, Internet & Security Focus, Focus 1, Understanding DNS based on internet usage and DNS security, Korea Internet & Security Agency, Korea, pp.6-25, September, 2013.
|
3 |
The Verisign Domain Name Industry Brief, Q3, 2018, https://www.verisign.com/en_US/domain-names/dnib/index.xhtml (accessed February, 8, 2019).
|
4 |
Ministry of Science and ICT, Basic Plan for Promotion and Management of the Development and Utilization of the 5th Internet Address Resources (2018-2020), Korea, pp.1-16, May, 2018.
|
5 |
Cybersquatter, Wikipedia, December, 2018, https://en.wikipedia.org/wiki/Cybersquatting (accessed December, 10, 2018).
|
6 |
Secure News, June, 2017, https://www.boannews.com/media/view.asp?idx=55083 (accessed January, 2, 2019).
|
7 |
ICANN, Resources, Help, Domain Name Dispute Resolution, https://www.icann.org/resources/pages/dndr-2012-02-25-en (accessed January, 7, 2019).
|
8 |
Namecoin, https://www.namecoin.org/, (accessed February, 16, 2019).
|
9 |
EmerDNS, Emercoin, https://emercoin.com/en/documentation/blockchain-services/emerdns/emerdns-introduction, (accessed March, 20, 2019).
|
10 |
Domain Name System, Wikipedia, February 2019, https://en.wikipedia.org/wiki/Domain_Name_System (accessed December, 3, 2018).
|
11 |
Charles M. Kozierok, The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference, p.825-927, acorn publishing company, 2007.
|
12 |
KRNIC, Internet Address Resource, Domain Name System(DNS), https://xn-3e0bx5euxnjje69i70af08bea817g.xn-3e0b707e/jsp/resources/dns/dnsInfo.jsp (accessed January, 8, 2019).
|
13 |
Jae-Wook Heo, Sung-Soo Kim, Jeong-Ho Kang, Moon-Seog Jun, "Study on Improvement and Correlation of Blockchain and Right to be Forgotten", The KIPS Fall Conference 2018 on Korea Information Processing Society , Vol.25, No.2 pp.231-234, November, 2018.
|
14 |
Jonathan Strickland, What is Computing Power?, Howstuffworks, https://computer.howstuffworks.com/computing-power.htm (accessed February 12, 2019).
|
15 |
Go Ethereum, https://geth.ethereum.org/downloads/(accessed November, 10, 2018).
|
16 |
Domain Service, https://netsvill.net/domain/1_4_a.asp (accessed January, 2, 2019).
|
17 |
Tom Olzak, "DNS Cache Poisoning: Definition and Prevention", http://www.infosecwriters.com, pp.4-7, March, 2006.
|
18 |
Lan Green, "DNS Spoofing by The Man In The Middle", SANS Institute InfoSec Reading Room, pp.5, 2005.
|
19 |
Bennett Garner, What's a Sybil Attack & How Do Blockchains Mitigate Them?, Coin Central, August, 2018, https://coincentral.com/sybil-attack-blockchain/, Coin Central (accessed January 6, 2019).
|
20 |
Georgios Kambourakis, Tassos Moschos, Dimitris Geneiatakis, and Stefanos Gritzalis, "Detecting DNS Amplification Attacks", Critical Information Infrastructures Security, Lecture Notes in Computer Science, Vol.5141, pp.185-196, October, 2007 DOI: https://doi.org/10.1007/978-3-540-89173-4_16
|
21 |
Ji-yeon Kim, Ju-Li Lee, Eun-Ji Park, Eun-Young Jang, Hyung-jong Kim, "A study of Modeling and Simulation for Analyzing DDoS Attack Damage Scale and Defence Mechanism Expense", The Korea Society for Simulation, Vol.18, No.4, pp.39-47, December, 2009.
|
22 |
Sawan Kumar, Jens Hermann Paulsen, Prevention of DDoS attacks with Blockchain technology, Deloitte, UK,pp.1-3, December, 2017.
|