共 22 条
[1]
AndersonRH,BrackneyR,BozekT. AdvancedNetworkDefenseRe search:ProceedingsofaWorkshop . 2000
[2]
NeoWorx. http://www.specter.com . 1999
[3]
DeceptionToolkit. CohenF. http://www.all.net/dtk . 1998
[4]
InternetHoles-InternetLightningRods. CohenF. NetworkSe curityMagazine . 1996
[5]
InternetHoles-InternetLightningRods. CohenF. NetworkSe curityMagazine . 1996
[6]
VirtualHoneynets. ClarkM. http://www.securityfocus.com/cgi-bin/infocus.pl?id=1506 . 2001
[7]
ToBuildAHoneypot. SpitznerL. http://www.cs.columbi a.edu/ids/research/keypapers/papers/security/honeypot.htm . 2000
[8]
Lessons Learned from Deploying a Honey Pot. Schwabel J,Rohring N,Hall M,et al. Information Security . 2000
[9]
Honeynets. Brenton C. Proceedings of SPIE - The International Society for Optical Engineering . 2001
[10]
Trapping and Tracking Hackers: Collective security for survival in the Internet age. Moran DB. Third Information Survivability Workshop[C] . 2000