최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會誌 = KIISC review, v.17 no.2, 2007년, pp.80 - 89
전용희 (대구가톨릭대학교 컴퓨터정보통신공학부) , 장종수 (한국전자통신연구원 정보보호연구단 보안응용그룹)
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Anukool Lakhina, Mark Crovella, and Christophe Diot, 'Diagnosing Network-Wide Traffic Anomalies', SIGCOMM'04, Aug. 30-Sep.3, 2004. Portland, Oregon, USA
A. Lakhina, M. Crovella, and C. Diot, 'Characterization of Network-Wide Anomalies in Traffic Flows', IMC '04, Taormina, Sicily, Italy, Oct. 2004
Howard F. Lipson, Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues. Technical report, CERT Coordination Center, Nov. 2002
Simon Hansman, A Taxonomy of Network and Computer Attack Methodologies, University of Canterbury, New Zealand, Nov. 2003
V. Yegneswaran, P. Barford, and J. Ullrich, 'Internet Intrusions: Global Characteristics and Prevalence', In ACM SIGMETRICS, San Diego, June 2003
A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C.-N. Chuah, and C. Diot, 'Characterization of Failures in an IP Backbone', In IEEE INFOCOM, Hong Kong, April 2004
N. Weaver. Warhol Worms: The Potential for Very Fast Internet Plagues, http://www.cs.berkeley.edu/~nweaver/warhol. htmI
A. Hussain, J. Heidemann, and C. Papadopoulos, 'A Framework for Classifying Denial of Service Attacks', In ACM SIGCOMM, Karlsruhe, Aug. 2003
J. Mirkovie and P. Reiher, 'A Taxonomy of DDoS Attacks and Defense Mechanisms', ACM CCR, April 2004
P. Barford, J. Kline, D. Plonka, and A. Ron, 'A Signal Analysis of Network Traffic Anomalies', In Internet Measurement Workshop, Marseille, Nov. 2002
N. Duffield, C. Lund, and M. Thorup, 'Estimating Flow Distributions from Sampled Flow Statistics', In ACM SIGCOMM, Karlsruhe, Aug. 2003
J. Jung, B. Krishnamurthy and M. Rabinovich, Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In World Wide Web Conference, Hawaii, May 2002
Glenn Gebhart, Worm Propagation and Countermeasures, SANS Institute, 2004
Internet Security Systems, ISS Security Advisory: 'Snork' Denial of Service Attack Against Windows NT RPC Service. 1998. http://xforce.iss.net/xforce/alerts/id/advise9
Ed Skoudis and Lenny Zeltser, Malware: Fighting Malicious Code, Prentice-Hall, 2004, (Chapter 2: Virus, 3: Worm)
Xuan Chen and John Heidemann, Detecting Early Worm Propagation through Packet Matching, Technical Report ISI-TR-2004-585, 2004
Jing Yang, 'Fast Worm Propagation in IPv6 Networks'
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.