참고문헌
- Information Warfare Conference Information Warfare: an Introduction Reto E. Haeni
- Proceedings of NISSC Information Warfare. INFOSEC and Dynamic Information Defense Winkler J.R.;Oshea C.J.;Stokrp M.C.
- ETRI 주간기술동향 인터넷 보안기술 동향 분석 서동일;강훈
- Telecommunications Review v.10 no.5 사이버테러 기술 및 대응방안의 현황 분석 서동일;윤이중;조현숙
- Security PLUS for UNIX POSTECH
- Hacking Exposed : Network Security Secrets & Solutions(2nd Edition) Joel Scambray;Stuart McClure;George Kurtz
- 안철수연구소 홈페이지 안철수연구소
- Understanding Information Age Warfare David S. Alberts;John J. Garstka;Richard E. Hayes;David A. Signori
- 12th JCCI Network기반 실시간 역추적 시스템의 설계 최양서;최병철;강동호;서동일
- KIPS Journal v.9-C no.3 해킹 기법을 이용한 내부망 보안 평가 방법 서동일;최병철;손승원;이상호
- 7th COMSW 방화벽 우회방지 기술 분석 강동호;최양서;서동일;이상호
- LNCS 2288 A New Buffer Overflow Hacking Defense Technique with Memory Address Confirmation Y.S. Choi;Dong-il SEO;Sung Won Sohn
- Design of Network-based Real-Time Traceback System S.W. Han;D.H. Kang;Dong-il SEO;Sang Ho Lee
- CERT CERT
- DARPA DARPA
- National Plan for Information Systems Protection, Version 1.0 : An Invitation to a Dialogue CIAO
- IETF IETF
- infowar.com
- 정보처리 v.7 no.2 차세대 공격형 정보 보안 기술 장희진;박보석;김상욱
- FIRST 2002 Adaptive Rule Estimation (ARE) Algorithm against Eluding NIDS Byeong-Cheol Choi;Dong-il Seo;Sung-Won Sohn;Sang-Ho Lee;Chaeho Lim
- KISA KISA
- Proceedings of the 4th USENIX Security Symposium Caller Identification System in the internet Environment Hyn Tae Jung;H.L. Kim;Y.M. Seo;G. Choe;S.L. Min;C.S. Kim
- Proceedings of the 1995 IEEE Symposium on Security and Privacy Holding Intruders Accountable on the Internet Stuart Staniford-Chen;L. Todd Heberlein
- 6th ESORICS 2000, LNCS-1985 Finding a Connection Chain for Tracing Intruders K.Yoda;H. Etoh;F. Guppens(ed.);Y. Deswarte(ed.);D.Gollarnann(ed.);M. Waidner(ed.)
- Proceedings of 9th USENIX Security Symposium Detecting Stepping Stones Y. Zhang;V. Paxson
- 정보처리학회 논문지 인터넷 해킹 피해시스템 자동분석에이전트(AIAA) 및 침입자 역추적 지원 도구 구현 임채호;원유헌
- Proceedings of IFIP Conference on Security Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework X. Wang;D. Reeves;S.F. Wu;J. Yuill
- Proceedings of the 2nd DARPA DISCEXII Cooperative Intrusion Traceback and Response Architecture (CITRA) D. Schnackenberg;K. Djahandari;D. Strene;Harley Holiday;Randall Smith
- The Terrorism Research Center Homepage
- 정보보호학회 논문지 v.12 no.3 IP 역추적을 위한 새로운 접근 : 패킷 손실 기반의 논리적 전송 경로 추정 이준엽;이승형;양훈기;고재영;강철오;정주영
- ETRI 주간기술동향 no.1-48 네트워크 보안을 위한 ESM 기술 동향 정연서;류걸우;장종수
- IEEE Internet Computing v.6 no.2(Issue) Tracing network attacks to their sources T. Baba;S. Matsuda
- ACM Transactions on Information and System Security v.5 no.2 An algebraic approach to IP traceback Drew Dean;Matt Franklin;Adam Stubblefield
- IEEE Computer Graphics and Applications v.22 no.1(Issue) Intrusion and Misuse Detection in Large-scale Systems R.F. Erbacher;K.L. Walker;D.A. Frincke
- ACM Computer Comm. Review An analysis of using reflectors for distributed denial-of-service attacks Vern Paxson
- Proceedings of IEEE Workshop on Information Assurance and Security A Combined Offensive/Defensive Network Model Anthony Ruocco;Nathan Buchheit;Daniel Ragsdale
- Proceedings of 33rd Hawaii International Conference on System Sciences Agent-Based Simulation Approach to Information Warfare in the SEAS Environment A.R. Chaturvedi;M.Gupta;S.R. Meehta;Wei, T. Yue
- Proceedings of IEEE Workshop on Information Assurance and Security Preparing to Defend Against Cyberattack J.Schumacher;D.Welch