Neue Herausforderungen für den Schutz kritischer Infrastrukturkomponenten in zukünftigen IP-Netzen
暂无分享,去创建一个
[1] Ehab Al-Shaer,et al. Discovery of policy anomalies in distributed firewalls , 2004, IEEE INFOCOM 2004.
[2] Jürgen Quittek,et al. NEC's Simple Middlebox Configuration (SIMCO) Protocol Version 3.0 , 2006, RFC.
[3] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[4] Erwin P. Rathgeb,et al. The Honeynet quarantine: reducing collateral damage caused by early intrusion response , 2005 .
[5] Birger Tödtmann,et al. Risk Assessment of Production Networks Using Honeynets - Some Practical Experience , 2005, ISPEC.
[6] Chae Sub Lee,et al. Realization of the next-generation network , 2005, IEEE Communications Magazine.
[7] Birger Tödtmann,et al. Anticipatory Distributed Packet Filter Configuration for Carrier-Grade IP-Networks , 2006, Networking.
[8] Matt Bishop. Introduction to Computer Security , 2004 .
[9] Avishai Wool,et al. Firmato: a novel firewall management toolkit , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[10] Peter J. Denning,et al. Data Security , 1979, CSUR.
[11] Jack Koziol. Intrusion Detection with Snort , 2003 .
[12] Birger Tödtmann,et al. Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet , 2005, NETWORKING.