참고문헌
- Inside the Slammer, in IEEE Security and Privacy 2003
- Symantec ISTR VXI, 2007
- IDC, Worldwide IT Security Software, Hardware, and Services 2004-2008 Forecast: The Big Picture
- IDC, Korea Security Appliances 2004-2008 Forecast and Analysis, 2005
- H. -A., Kim and Karp, B. "Autograph: Toward Automated, Distributed Worm Signature Detection," Proc. of the 13th Usenix Security Symposium, 2004
- Newsome, J., Karp, B., and Song, D., "Polygraph: Automatically Generating Signatures for Polymorphic Worms," Proc. of the IEEE Symposium on Security and Privacy, 2005
- Singh S., Estan C., Varghese G., and Savage S., "Automated worm fingerprinting," Proc. of 6th Symposium on Operating System Design and Implementation, 2004
- EMIST project, http://emist.ist.psu.edu
- Levitt K,N., Rowe J. and Schooler E. M., "A Distributed Host-based Worm Detection System," the Special Interest Group on Data Communication, 2006
- ETRI-ZASMIN, http.//www.etri.re.kr
- IETF RFC 3080, The Blocks Extensible Exchange Protocol Core (BEEP), 2001
- IETF RFC 3460, Policy Core Information Model (PCIM) Extensions, 2003
- IETF RFC 4765, The Intrusion Detection Message Exchange Format (IDMEF), 2007
- IETF RFC 4767, The Intrusion Detection Exchange Protocol (IDXP), 2007