1. Ahnlab (2011) 3.4 DDoS analysis report
2. http://en.wikipedia.org/wiki/Netstat
3. Hwan LY, Ryeol RH, Sung CK, Wook PC, Hyung PW, Ho KK (2012) A study on malware detection system model based on correlation analysis using live response techniques. Inf Sci Appl (ICISA), 2012 International Conference, pp 1–6. 5
4. IETF, Brezinski D (2002) Guidelines for evidence collection and archiving, IETF RFC 3227
5. INCA-CERT (2012) Internet banking malware, Google Code spread through the attempt to bypass the Google Code hosting, http://erteam.tistory.com/313