References
- US-SERT, http://www.us-cert.gov/
- H.T. Kulin, H.L. Kim, Y.M. Seo, G. Cheo, S.L. Min, C.S. Kim, 'Caller Identification System in the Internet Environment,' Proc. of the USENIX Security 4th Symposium, 1993
- Steven R. Snapp, James Brentano, Gihan V. Dias, 'DIDS(Distributed intrusion Detection System)- Motivation, Architecture, and An Early Prototype,' Proc. of the 14th National Computer Security Conference, 1991
- S. Staniford-Chen and L.T. Heberlein, 'Holding intruders accountable on the internet,' In Proc. of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 39-49, 1995
- K. Yoda and H. Etoh. 'Finding a Connection Chain for Tracing Intruders,' 6th European Symposium on Research in Computer Security - ESORICS 2000th, pp. 191-205, 2000
- S. Stenfan, W. Dwetherall, 'Network Support for IP Traceback,' IEEE/ACM Transactions on networking, Vol. 9, No.3, June 2001
- 허준, 강명수, 홍충선, 'IPv6 네트워크 환경에서의 경량화된 IP 역추적 기법', 한국정보보호학회 논문지, pp 93-102, 2007
- D.X. Song, A. Perrig, 'Advanced and Authenticated Marking Scheme for IP Tracebackm,' In Proc. of IEEE INFOCOM Conference, 2001
- Steve Bellovin, Marcus Leech, Tom Taylor, 'ICMP Traceback Messages,' IETF, draft-ietf-itrace-04, Feb. 2003
- R. Stone, 'Centertrack:An IP Overlay Network for Tracking DoS Floods,' Proc. of 9th USENIX Security Symposium, Denver, Colorado, pp. 199-212, August, 2000
- A.C. Snoeren, C. Partridge, L.A. Sanchez, W.T. Strayer, C. D. Jones, F. Tchakountio and S.T. Kent,'Hash-Based IP Traceback' BBN Technical Memorandum, No.1284, Feb. 7. 2001
- H.Y. Chang, R Narayan, S.F. Wu, B.M. Vetter, X. Wang, M. Brown, J.J. Yuill, C. Sargor, F. Jou, F. Gong,'Deciduous:Decentralized Source Identification for Network-based Intrusions,' 6th IFIP/IEEE International Symposium on Integrated Network Management, 1999
- Stefan Savage, David Wtherall, Anna Karlin and Tom Anderson,'Practical Network Support for IP Traceback' Proc. Of ACM SIGCOMM 2000, pp. 295-306, 2000
- Tian Huirong, Richard Brackney, H. Y. Youm, 'Draft text of Rec. X.tb-ucr: Traceback Use Cases and Capabilities', TD4158, ITU-T SG17, Sep. 2008
- U.N. Agency Eyes Web Anonymity Controls, http://www.cbsnews.com/stories/2008/09/12/tech/ cnettechnews/main4443738.shtml
- J. Han, R. Kim, H. Youm, J. Ryou, 'Survey of Traceback techniques and Requirements on Traceback in the NGN Environment', JWIS2008, pp. 267-281, July 2008