References
- A. Oline and D. Reiners, "Exploring Three- Dimensional Visualization for Intrusion Detection," Proceedings of the IEEE Workshop on Visualization for Computer Security, Oct. 2005, pp. 113-120.
- E. L. Malecot, M. Kohara, Y. Hori, and K. Sakurai, "Interactively Combining 2D and 3D Visualization for Network Traffic Monitoring," Proceedings of the 3rd International Workshop on Visualization for Computer Security, Nov. 2006, pp. 123-127.
- 장범환, "종단간의 유사 연결 패턴을 갖는 정상서버 활동과 공격의 구분 및 탐지 방법," 정보보호학회논문지, 22(6), 2012, pp. 1315-1324.
- 장범환, 나중찬, 장종수, "보안 이벤트 시각화를 이용한 보안 상황 인지 기술," 정보보호학회지, 16(2), 2006, pp. 18-25.
- 정치윤, 손선경, 장범환, 나중찬, "시각화 기반의 효율적인 네트워크 보안 상황 분석 방법," 한국정보보호학회논문지, 19(3), 2009, pp. 107-117.
- Beom-Hwan Chang and Chi-Yoon Jeong, "An Efficient Network Attack Visualization using Security Quad and Cube," ETRI Journal, vol. 33 no 5, Oct. 2011, pp. 770-779. https://doi.org/10.4218/etrij.11.0110.0570
- A. Giani, I. G. D. Souza, V. Berk, and G. CybenkoI, "Attribution and Aggregation of Network Flows for Security Analysis," Proceedings of the 2006 CERT FloCon Workshop, Oct. 2006, pp. 1-4.
- E. W. Bethel, S. Campbell, E. Dart, K. Stockinger, and K. Wu, "Accelerating Network Traffic Analytics Using Query-Driven Visualization," Proceedings of the 2006 IEEE Symposium on Visual Analytics Science and Technology, Oct. 2006, pp. 115-122.
- K. Lakkaraju, W. Yurcik, and A. J. Lee, "NVisionIP: Netflow Visualizations of System State for Security Situational Awareness," Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Oct. 2004, pp. 65-72.
- R. Ball, G. A. Fink, and C. North, "Home-Centric Visualization of Network Traffic for Security Administration," Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Oct. 2004, pp. 55-64.
- Y. Hu, "Adaptive Flow Aggregation-A New Solution for Robust Flow Monitoring under Security Attacks," Proceedings of the 10th IEEE/IFIP on Network Operations and Management Symposium, Apr. 2006, pp. 424-435.
- X. Yin, W. Yurcik, and A. Slagell, "The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness," Proceedings of the 3rd IEEE International Workshop on Information Assurance, Mar. 2005, pp. 141-153.
- T. Taylor, D. Paterson, J. Glanfield and et al., "FloVis: Flow visualization system," Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications & Technology, Mar. 2009, pp. 186-198.
- S. Krasser, G. Conti, J. Grizzard, J. Gribschaw, and H. Owen, "Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization," Proceedings of the 2005 IEEE Workshop on Information Assurance Workshop, Jun. 2005, pp. 42-49.
- G. Conti, and K. Abdullah, "Passive Visual Fingerprinting of Network Attack Tools," Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Oct. 2004, pp. 45-54.
- 장범환, "스마트그리드 전력망의 NSM 기반 보안관리시스템 설계 및 구현," 디지털산업정보학회논문지, 제9권, 제3호, 2013, pp. 107-117.
- 최희식, 전문석, 박재표, "SIP 플러딩 탐지 차단 실험방법에 대한 연구," 디지털산업정보학회논문지, 제7권, 제2호, 2011, pp. 39-46.
Cited by
- 입출력 형태에 따른 다중처리기 시스템의 성능 분석 vol.12, pp.4, 2015, https://doi.org/10.17662/ksdim.2016.12.4.071
- Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol vol.13, pp.1, 2015, https://doi.org/10.17662/ksdim.2017.13.1.087
- 시계열 방사축과 원통좌표계를 이용한 네트워크 트래픽 공격 시각화 vol.10, pp.12, 2019, https://doi.org/10.15207/jkcs.2019.10.12.017