References
- http://isis.nic.or.kr/sub05/sub05_index.html
- http://www.ecommerce.go.kr/tongl.asp
- Dorothy E, Denning, 'Information Warfare and Secuhty', Addison-wesley, April 1999
- 정연서, 류걸우, 남택용, 손승원, '사이버 위협에 대한 보안 솔루션 기술 동향,' ETRI 주간 기술 동향, 2002 October
- 조대일, 송규철, 노병구, 네트워크 침입탐지와 해킹 분석 핸드북, 인포북, 2001
- Ulrich Ultes-Nitsche and InSeon Yoo, 'An integrated Network Security Approach-Pairing Detecting Malicious Patterns with Anomaly Detection, ' Proc. of Conference on Korean Science and Engineering Association in UK(KSEAUK2002), July 2002
- InSeon Yoo and Ulrich Ultes-Nitsche , 'An Intelligent Firewall to Detect Novel Attacks? An Integrated Approach based on Anomaly Detection Against Virus Attacks,' November 2002
- An Introduction to Computer Security : The NIST Handbook, NIST Special Publication 800-12, January 1
- William R. Cheswick, Steven M. Bellovin Firewalls and Internet Security: Repelling the Willy hacker, Addison Wesley, 1994
- D. Brent Chapman, Elizabeth D. Zwicky, Building Internet Firewalls, O Reilly & Associations, Inc. January 1996
- Chris Hare, Karanjit Siyan, Internet Firewalls and Network Security ? 2nd ed. New Readers, 1996
- Peter A. Loscocco, Wtephen D. Dmalley, Patric A. Muckelbauer, Ruth C. Taylor, S.Jeff Truner, John F. Farrel, 'The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments', National Security Agency, 1997
- David F. Ferraiolo, Ravi Sandu, & Serban Gavrila, 'A Proposed Standard for Role-Based Access Control,' ACM transaction on Information and System Security, V0L.4, N0.3, pp.224-274, Aug. 2001 https://doi.org/10.1145/501978.501980
- DoD 5200.28-STD. 'Department of Defense Trusted Computer System Evaluation Criteria', December 1985
- D.Ferraolo and R, Kuhn, 'Role-Based Access Control', Proceeding of the 15th National Computer Security Conference, 1992
- Dorothy E, Denning, 'Information Warfare and Security', Addison-wesley, April 1999
- Linux 2.4.18 Krnel-RELEASE Source Code
- B. H. Jung, J. N. Kim, 'Design of Dynamic Intrusion Detection Rule Modification Technique for Kernel Level Intrusion Detection,' 한국정보처리학회 추계학술대회 논문집, Vol. 9, No. 2, Nov. 2002
- S.H. Jo, J. N. Kim, & S. W. Sohn, 'Design of Web-based Security Management for Intrusion Detection', Proc. of ICEB, ICEB '2002, 2002
- J. G. Ko, J. N. Kim, & K. I. Jeong, 'Access Control for Secure FreeBSD Operating System,' Proc. of WISA 2001, The Second International Workshop on Information Security Applications, 2001
- http://www.fortinet.co.kr/
- http://www.symantec.com/
- http://www.cisco.com/
- http://www.nortelnetworks.com/
- http://www.enterasys.com/
- RFC 1858, Security Considerations for IP Fragment Filtering