Deterring hacking strategies via targeting scanning properties

[1]  Stuart McClure,et al.  Hacking Exposed: Network Security Secrets and Solutions, Fourth Edition , 2001 .

[2]  Tadeusz Pietraszek,et al.  Data mining and machine learning - Towards reducing false positives in intrusion detection , 2005, Inf. Secur. Tech. Rep..

[3]  L. Spitzner,et al.  Honeypots: Tracking Hackers , 2002 .

[4]  Meharouech Sourour,et al.  Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.

[5]  Giovanni Vigna,et al.  An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[6]  Tom Markham,et al.  Architecture and applications for a distributed embedded firewall , 2001, Seventeenth Annual Computer Security Applications Conference.

[7]  Yan Zhang,et al.  The Design and Implementation of Host-Based Intrusion Detection System , 2010, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.

[8]  Todd L. Heberlein,et al.  Network intrusion detection , 1994, IEEE Network.

[9]  Norah Abokhodair,et al.  Saudi Arabia's response to cyber conflict: A case study of the Shamoon malware incident , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.

[10]  T. Holt,et al.  Techcrafters and Makecrafters: A Comparison of Two Populations of Hackers , 2008, 2008 WOMBAT Workshop on Information Security Threats Data Collection and Sharing.

[11]  Jian Bao,et al.  Research on network security of defense based on Honeypot , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).