참고문헌
- B. I. Jang and C. S. Kim, “A Study on the Security Technology for the Internet of Things,” Journal of Security Engineering, Vol. 10, No. 2, pp. 256-270, 2014. DOI: 10.1109/ICIMSA.2016.7503989
- Y. Cui, H. G. Lee, M. J. Kim and H. J. Lee, "Design and Development for a Media Sharing Platform Based on UPnP," Proceeding of KCC 2010, KISS, Vol. 37, No. 2(B), pp. 309-314, 2010.
- J. H. Shin and W. Shin, "A New Defense against DDoS Attacks using Reputation," Journal of the Korea Institute of Information and Communication Engineering, Vol. 15, No. 8, pp. 1720-1726, 2011. DOI: 10.6109/jkiice.2011.15.8.1720
- S. R. Jung and H. Y. Yun, “Adaptively Flexible Service Discovery and Advertisement for SSDP of UPnP in Wireless ad-hoc Network,” The KISS Transactions:Part A, Vol. 17-A, No. 5, pp. 237-248, 2010. DOI: 10.3745/KIPSTA.2010.17A.5.237
- M. Kuhrer, "Thomas Hupperich, Christian Rossow, and Thorsten Holz," Exit from Hell? Reducing the Impact of Amplification DDoS Attacks," In proceeding 23rd USENIX Security Symposium, uSENIX Association, pp. 111-125, 2014
- H Choi, H Park and H Lee, “A Study on Amplification DRDoS Attacks and Defenses,” The Journal of Korea Institute of Information, Electronics, and Communication Technology, Vol. 8, No. 5, pp. 429-437, 2015. DOI: 10.17661/jkiiect.2015.8.5.429
- K. Hengst, "DDoS through the Internet of Things," Prooceeding of the 25th Twente Student Conference on IT, pp. 1-9, 2016.
- A. A. Md. and M. Haque, "UPnP Networking: Architecture ad Security Issues," Prooceeding of the TKK Seminar on Network Security, 2007.
- J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things (IoT): a vision, architectural elements and future directions,” Journal of Future Generation Computer Science, Vol. 29, No. 7, pp. 1645-1660, 2013. https://doi.org/10.1016/j.future.2013.01.010
- A. P. Castellani, N. Bui, P. Casari, M. Rossi, Z. Shelby and M. Zorzi, "Architecture and protocols for the Internet of Things: A case study," Prooceeding of the 8th IEEE international Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 678-683, 2010.
- S. C. Noh and J. G. Kim, "A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration," Jouranl of Information and Security, Vol. 15, No. 4, pp. 41-47, 2015
- J. H. Oh and K. H. Lee, "Attack Scenarios and Countermeasures using CoAP in IoT Environment," Journal of the Korea Convergence Society, Vol. 7, No. 4, pp. 33-38, Aug. 2016. DOI: 10.15207/JKCS.2016.7.4.033
- D. Perakovic, M. Perisa and I. Cvitic. "Analysis of the IoT Impact on Volume of DDoS Attacks," Prooceeding of the PosTel 2015, 2015.
- H. J. Mun, G. H. Choi and Y. C. Hwang, “Countermeasure to Underlying Security Threats in IoT communication,” Journal of IT Convergence Society for SMB, Vol. 6, No. 2, pp. 37-44, Jun. 2016. DOI: 10.22156/CS4SMB.2016.6.2.037
- Nazrul Hoque, Dhruba K. Bhattacharyya, and Jugal K. Kalita, "Botnet in DDoS Attacks: Trends and Challenges," Journal of IEEE Communications Surveys & Tutorials, Vol. 17, No. 4, pp. 2242-2270, Jul. 2015. DOI: 10.1109/COMST.2015.2457491
- B. A. Miller, T. Nixon, C. Tai, and M. D. EWood, "Home Networking with Universial Plug and Play," IEEE Computer Magazine, Vol. 29, No. 12, pp. 104-109, Dec. 2001. DOI: 10.1109/35.968819
- S. I. Yoon and G. C. Sihn, “Service Discovery Protocols for Ubiauitous Computing Environments,” Electronics and Telecommunication Trends, Vol. 20, No. 1, pp. 147-156, 2005.
- C. Rossow, "Amplification Hell: Revisiting Network Protocol for DDoS Attacks," In the Proceeding of the NDSS'14, San Diego, USA, pp. 1-15, 2014. DOI: 10.14722/ndss.2014.23233
- S. S. Shin, G. S. Chae and T. H. Lee, “An Investigation Study to Reduce Security Threat in the Internet of Things Environment,” Journal of IT Convergence Society for SMB, Vol. 5, No. 4, pp. 31-36, Dec. 2015.
- H. J. Mun, S. H. Choi and Y. C. Hwang, “Effective Countermeasure to APT Attacks using Big Data,” Journal of IT Convergence Society for SMB, Vol. 6, No. 1, pp. 17-23, Mar. 2016. DOI: 10.22156/CS3SMB.2016.6.1.017
- G. I. Kim, Y. C. Kim and J. K. Lee, “An Efficiency Authentication Security Mechanism of VANET in Highway,” Journal of IT Convergence Society for SMB, Vol. 6, No. 3, pp. 57-64, Sep. 2016. DOI: 10.22156/CS4SMB.2016.6.3.057
- J. Y. Jung and M. A. Lee, "Current Status of Digital Braille Music and Policy Proposal," Journal of digital Convergence, Vol. 13, No. 8, pp. 51-57, Aug. 2015. DOI: 10.14400/JDC.2015.13.8.51
- H. S. Lee and S. H. Lee, "Impact on Internalization of Management Strategy in Public Organization," Journal of digital Convergence, Vol. 14, No. 5, pp. 1-10, May. 2016. DOI: 10.14400/JDC.2016.14.5.1
- D. S. Lee, "Design of Compact Data Integration and Convergence Device Using Esp8266 Module," Journal of the Korea Convergence Society, Vol. 8. No. 2, pp. 15-20, Feb. 2017. https://doi.org/10.15207/JKCS.2017.8.2.015
- J. C. Lee, "A Classification Algorithm using Extended Representation", Journal of the Korea Convergence Society, Vol. 8. No. 2, pp. 27-33, Feb. 2017. https://doi.org/10.15207/JKCS.2017.8.2.027