共 8 条
- [1] Multipot. ZIMMER D. http://labs.idefense.com/software/malcode.php . 2007
- [2] Know your enemy:tracking botnets,using honeynets to learn more about bots. BAECHER P,HOLZ T,KOETTER M,et al. http://www.honeynet.org/papers/bots/ . 2007
- [3] Application of a methodology tocharacterize rootkits retrieved from honeynets. LEVINE J,GRIZZARD J,OWEN H. Proceedings of the Fifth Annual Information Assurance Workshop . 2004
- [4] A virtual honeypot framework. PROVOS N. Proceedings of 13th USENIX Security Symposium . 2004
- [5] Towards a third generation data capture archi-tecture for honeynets. BALAS E,VIECCO C. Proceeedings of the 6th IEEE Information Assurance Workshop . 2005
- [6] The nepenthes platform:an efficient approach to collect malware. BAECHER P,KOETTER M,HOLZ T,et al. Lecture Notes in Com-puter Science . 2006
- [7] Know your enemy:phish-ing. WATSON D,HOLZ T,MUELLER S. http://www.honeynet.org/papers/phishing/ . 2007
- [8] Know your enemy:phish-ing. WATSON D,HOLZ T,MUELLER S. http://www.honeynet.org/papers/phishing/ . 2007