참고문헌
- 유승엽, 박동규, 오진태, 전인오, "ALADDIN의 어플리케이션 계층 공격 탐지 블록 ALAB 알고리즘의 최적 임계값 도출 및 알고리즘 확장", 정보처리학회지 제18-C권 제 3호, 2011
- 유승엽, 박동규, 장종수, "URI 및 브라우저 행동 패턴의 특성을 이용한 HTTP get flooding 공격 탐지 알고리즘", 한국정보기술학회지 제9권 제1호 159p-170p, 2011
- Markus J, Zulfikar R., "Crimeware: Understanding New Attacks and Defenses", Addison Wesley Professional, ISBN 0-321-50195-0, April 2008.
- Tuncer, T. and Tatar, Y. 2008 Detection SYN Flooding Attacks Using Fuzzy Logic. Proc. Int. Conf. Information Security and Assurance ISA'08, Washington, DC, USA, April 24-26, p. 321-325. IEEE Computer Society, NewYork, NY, USA
- U.Payer, M.Lamberger, and P.Teufl. Hybrid engine for polymorphic code detection. In Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment, pages 19-31
- Takeshi Yatagai, et al., "A HTTP Flooding Detection Method Based on Browser Behavior", 2007.
- Jinghe Jin, Nazarov Nodir, Chaetae Im, and Seung Yeob Nam, "Mitigating HTTP GET Flooding Attacks through Modified NetFPGA Reference Router", 1st Asia NetFPGA Developers Workshop, Daejeon, Korea, June 14, 2010.
- KINDER, J., KATZENBEISSER, S., SCHALLHART, C., and VEITH, H. "Detecting Malicious Code by Model Checking" In Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 2005.
- TADAO MURATA, "Petri Nets:Properties, Analysis and Applications", PROCEEDING OF THE IEEE, VOL. 77, NO. 4, APRIL 1989
- D.A.Zaitsev, T.R.Shmeleva, "Simulating of Telecommunication Systems with CPN Tools", Nov. 2006
- http://www.cpntools.org/