03-1 A Virtual Honeypot Framework
暂无分享,去创建一个
[1] Jon Postel,et al. Transmission Control Protocol , 1981, RFC.
[2] Smoot Carl-Mitchell,et al. Using ARP to implement transparent subnet gateways , 1987, RFC.
[3] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.
[4] Steven Glassman,et al. A Caching Relay for the World Wide Web , 1994, Comput. Networks ISDN Syst..
[5] Dino Farinacci,et al. Generic Routing Encapsulation over IPv4 networks , 1994, RFC.
[6] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[7] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[8] Dino Farinacci,et al. Generic Routing Encapsulation (GRE) , 2000, RFC.
[9] Farnam Jahanian,et al. Defeating TCP/IP Stack Fingerprinting , 2000, USENIX Security Symposium.
[10] Herbert W. Hethcote,et al. The Mathematics of Infectious Diseases , 2000, SIAM Rev..
[11] Beng-Hong Lim,et al. Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor , 2001, USENIX Annual Technical Conference, General Track.
[12] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[13] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[14] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[15] David A. Wagner,et al. Mimicry attacks on host-based intrusion detection systems , 2002, CCS '02.
[16] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[17] J. Crowcroft,et al. Automated NIDS Signature Creation using Honeypots , 2003 .
[18] David Moore,et al. Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[19] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..