A Virtual Honeypot Framework
暂无分享,去创建一个
[1] Smoot Carl-Mitchell,et al. Using ARP to implement transparent subnet gateways , 1987, RFC.
[2] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.
[3] Steven Glassman,et al. A Caching Relay for the World Wide Web , 1994, Comput. Networks ISDN Syst..
[4] Dino Farinacci,et al. Generic Routing Encapsulation over IPv4 networks , 1994, RFC.
[5] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[6] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[7] Kevin R. Fall,et al. Network emulation in the VINT/NS simulator , 1999, Proceedings IEEE International Symposium on Computers and Communications (Cat. No.PR00250).
[8] Dino Farinacci,et al. Generic Routing Encapsulation (GRE) , 2000, RFC.
[9] Farnam Jahanian,et al. Defeating TCP/IP Stack Fingerprinting , 2000, USENIX Security Symposium.
[10] Herbert W. Hethcote,et al. The Mathematics of Infectious Diseases , 2000, SIAM Rev..
[11] Robert Stone,et al. A Snapshot of Global Internet Worm Activity , 2001 .
[12] Beng-Hong Lim,et al. Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor , 2001, USENIX Annual Technical Conference, General Track.
[13] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[14] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[15] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[16] David A. Wagner,et al. Mimicry attacks on host-based intrusion detection systems , 2002, CCS '02.
[17] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[18] J. Crowcroft,et al. Automated NIDS Signature Creation using Honeypots , 2003 .
[19] David Moore,et al. Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[20] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[21] Bogdan M. Wilamowski,et al. The Transmission Control Protocol , 2005, The Industrial Information Technology Handbook.