References
- David Newman, Joel Snyder and Rodney Thayer, 'Crying wolf: False alarms hide attacks,' Network World, Jun. 2002
- Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan In Proc IEEE Symposium on Security and Privacy, Oakland, CA, May, 2004
- Hyang-Ah Kim, Brad Karp, 'Autograph : Toward Automated, Distributed Worm Signature Detection,' USENIX Security Symposium July. 2004
- 신승원, 강동호, 김기영, 장종수, 'DPI(Deep Packet Inspection) 기술 분석,' 전자통신동향분석. 2004.04
- 허영준, 류걸우, 장종수, 'Abnormal Traffic Detection for Network Intrusion Detection,' SAM.2004
- Packeteer, 'Detect and limit DoS attacks,' white paper, http://support.packeteer.com/.../prevent-dos-attacks.html
- Cisco Systems, 'Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks,' white paper, .http://www.cisco.com/warp/./newsflash.html, Feb.2000
- S. Northcutt, M. Cooper, M. Fearnow, and K. Frederick, 'Intrusion Signature and Analysis,' new riders, 2000
- 안개일, 김기영, 류걸우, 장종수, '비정상 트래픽의 대역폭 제한 결정 메커니즘', JCCI 2004.04
- 전용희, 류걸우, 장종수, '침입탐지시스템과 침입방지시스템의 기술 비교 및 동향', 정보통신연구진흥원 2004.6.9
- 전용희, 김기영, 장종수, '네트워크-기반 침입방지 시스템 성능평가 기술 동향', 정보통신연구진흥원 2004.8.11