참고문헌
- II-Sun You and Kyoungsan Cho, 'An Improved Detection System for the Network Vulnerability Scan Attacks,' The KIPS Transations : Part C, Vol.8-C, No. 5, pp.543-550, 2001
- Korea Information Security Agency, 'Analysis of Large Scale Network Vulnerability Scan Attacks and Implementation of the Scan-Detection tool,' 1999, http://www.certcc.or.kr
- Korea Information Security Agency, '2001 Security incident Statistic in Korea,' 2001, http://www.certcc.or.kr.
- Clifford Kahn, Don Bolinger and Dan Schnackenberg, 'A Common Intrusion Detection Framework,' 1998, http://www.isi.edu/~brain/cidf/drafts/communication.txt
-
D.Curry, H.Debar, 'Intrusion Detection Message Exchange Format data Model and Extensible Markup Language(XML) Document Type Difinition,
, 2002 - Dierks,T. and C.Allen, 'The TLS Protocol Version1.0,' RFC2246, 1999
-
Dipankar Gupta, 'IAP:Intrusion Alert Protocol,
, 2001 - Fielding, et al., 'Hypertest Transfer Protocol-HTTP/1.1,' RFC 2616, 1999
-
G.Mansfiled and D.Curr, 'Intrusion Detection Message Exchange Format Comparison of SMI and XML Implementions,
, 2000 - http://www.isi.edu/~brain/cidf/
- J.Kim and P.Bentley, 'The Artificial immune Model for Network Intrusion Detection,'7th European Congress on intelligent Techniques and Soft Computing(EUFIT'99), http://www.cs.ucl.ac.uk/stuff/J.Kim/publication.html, 1999
-
Mark Wood and Michael Erlinger, 'Intrusion Detection Message Exchange Requirements,
, 2002 - Peng Ning, Sushil Jajodia and Sean Wang, 'Abstraction based Intrusion Detection in Distributed Environments,' ACM Transactions on Information and System Security(TISSEC), Vol.4, Issue.4, pp.407-452, 2001 https://doi.org/10.1145/503339.503342
- Rich Feiertag, et al., 'A Common Intrusion Specification Language(CISL),' http://www.isi.edu/~brain/cidf/drafts/language.txt. 1999
- Stephen Northcutt, 'Intelligence Gathering Techniques,' http://www.microsoft.com/technet/security/intel.asp
- Pollock, et al., 'Implementing the Intrusion Detection Exchange Protocol,' Proceedings of the 17th Annual Computer Security Applications Conference, http://www.acsac.org/2001/papers/67.pdf, 2001 https://doi.org/10.1109/ACSAC.2001.991519
-
B.Feinstein, G.Matthews, and J.White, 'The Intrusion Detection Exchange Protocol(IDXP),
, 2002 - Wenke Lee, et al., 'A Data Mining and CIDF Based Approach for Detecting Nobel and distributed Intrusions,' Proceedings of the 3rd International Workshop on the Recent Advances in Intrusion Detection, pp.49-65, 2000