References
- Spitzer, L., Honeypots: Tracking Hackers, Addison-Wesley, 2002.
- Hwang, Y,. Park, D,. Yoo, S., Yim, H., Jang, J., and Oh, J., "A study of the worm detection method using self-replication," The Journal of Korea Information and Communications Society, vol.34, No.6, pp.169-178, 2009.
- Skormin, V., Volynkin, A., Summerville, D., and Moronski, J., "Prevention of information attacks by run-time detection of self-replication in computer codes," Journal of Computer Security, vol.15, No.2, pp.273-302, 2007. https://doi.org/10.3233/JCS-2007-15203
- Kim, I., "A malicious process control system for protecting servers from internet worm attacks," The Journal of Korea Information and Communications Society, vol.35, No.3, pp.431-439, 2010.
- Viega, J., Bloch, J., Kohno, T., and McGraw, G., "ITS4: A static vulnerability scanner for C and C++ code," In Proceeding of the 16th Annual Computer Security Applications Conference, 2000.
- Wagner, D., Foster, J., Brewer, E., and Aiken, A.k "A first step towards automated detection of buffer overrun vulnerabilities," In Proceedings of the Network and Distributed System Security Symposium, 2000.
- Xie, Y., Chou, A., and Engler, D., "ARCHER: Using symbolic, path-sensitive analysis to detect memory access errors," In Proceedings of the 9th European Software Engineering Conference, 2003.
- Bang, K. and Kong, J., "A study on secure code editor for secure software," Proc. of the KCC, pp.94-97, 2011.
- Cowan, C., Pu, C., Maier, D., Ginton, H., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., and Zhang, Q., "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-overflow Attacks," In proceeding of the 7th conference on USENIX Security, 1998.
- Pincus, J. and Baker, B., "Beyond stack smaching: Recent advances in exploiting buffer overruns," IEEE Security and Privacy, vol.2, No.4, pp.20-27, 2004.
- https://projects.honeynet.org/honeyc, accessed Jul. 2012
- https://projects.honeynet.org/capture-hpc, accessed Jul. 2012
- Sun, X., Wang, Y., Ren, J., Zhu, Y., and Liu, S., "Collecting internet malware based on client-side honeypot," Proc. of the 9th International Conference for Young Computer Scientists, pp.1493-1498, Nov. 2008.
- Kim, D., Cho, S., and Kim, H., "Efficient method to detect malicious web contents based on time-bomb," Journal of KIISE : Computing Practices and Letters, Vol. 17, No.1, pp.51-55, 2011.
- Kim, D., Kim, H., Park, M., and Cho, S., "Combining devide-and-conquer and sequential visitation algorithms on high-interaction client honeypots," Journal of KIISE : Computer Systems and Theory, Vol.39, No.2, pp.76-83, 2012.
- Kim, I., Jo, H., and Kim. M., "Design and implementation of a system to detect intrusion and generate detection rul against scan-based internet worms," The KIPS Transactions, Vol.12-C, No.2, pp.191-200, 2005.
- Song, J. and Kwon, Y., "An RTSD system against various attacks for low false positive rate based on patterns of attacker's behaviors," IEICE Transactions on Information and Systems, vol.89-D, No.10, pp.2637-2643, Oct. 2006.
- http://www.snort.org
- Bowen, B., Hershkop, S., Keromytis, A., and Stolfo, S., "Baiting inside attackers using decoy document," Proc. of the 5th International ICST Conference, pp.51-70, Sep. 2009.
- Bowen, B., Salem, B., Hershkop, S., Keromytis, A., and Stolfo, S., "Designing host and network sensors to mitigate the insider threat," IEEE Security & Privacy, vol.7, No.6, pp.22-29, Nov. 2009.
- Salem, B., and Stolfo, S., "Decoy document deployment for effective masquerade attack detection," Proc. of the 8th International Conference on DIMVA, pp.35-54, Jul. 2011.
- Kim, I., and Kim, M., "Agent-based honeynet framework for protecting servers in campus networks," IET Information Security, vol.6, No.3, pp.202-211, Sep. 2012. https://doi.org/10.1049/iet-ifs.2011.0154
- Jain, P., and Sardana, A., "Defending against Internet Worms using Honeyfarm," Proc. of the CUBE International Information Technology Conference, pp. 795-800, Sep. 2012.