[1] 国家互联网应急中心(CNCERT). 2009中国互联网网络安全报告[EB/OL]. (2012-02-24). http://www.cert.org.cn/UserFiles/ File/CNCERT%20Annual%20Report%202009(3).pdf.
[2] Kijewski P. ARAKIS: An Early Warning and Attack Identifi- cation System[C]//Proc. of the 16th Annual First Conference on Computer Security Incident Handling. Dudapest, Hungary: [s. n.], 2004.
[3] Cuppens F, Miege A. Alert Correlation in a Cooperative Intrusion Detection Framework[C]//Proc. of IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Computer Society, 2002.
[4] Locasto M E, Parekh J J, Keromytis A D, et al. Towards Collaborative Security and P2P Intrusion Detection[C]//Proc. of the 6th Annual IEEE Workshop on Information Assurance and Security. Los Alamitos, USA: IEEE Computer Society, 2005. (下转第33页)
[5] 许 佳, 冯登国, 苏璞睿. 基于动态对等网层次结构的网络预警模型研究[J]. 计算机研究与发展, 2010, 47(9): 1574- 1586.
[6] Foster I, Zhao Yong, Raicu I, et al. Cloud Computing and Grid Computing 360-degree Compared[C]//Proc. of IEEE Grid Computing Environments Workshop. Austin, Texas, USA: [s. n.], 2008.
[7] Oberheide J, Cooke E, Jahania F. CloudAV: N-version Anti- virus in the Network Cloud[C]//Proc. of the 17th USENIX Security Symposium. Berkeley, USA: USENIX Association Press, 2008.
[8] Sidiroglou S, Ioannidis J, Keromytis A D, et al. An Email Worm Vaccine Architecture[C]//Proc. of the 1st Information Security Practice and Experience Conference. Berlin, Germany: Springer-Verlag, 2005.
[9] Moshchuk A, Bragin T, Deville D, et al. Spyproxy: Execution- based Detection of Malicious Web Content[C]//Proc. of the 16th USENIX Security Symposium. Berkeley, USA: USENIX Association Press, 2007.
[10] JXTA Community Projects[EB/OL]. (2012-02-26). https:// jxta.dev.java.net.
[11] Al-Mamory S O, Zhang Hongli. Intrusion Detection Alarms Reduction Using Root Cause Analysis and Clustering[J]. Computer Communications, 2009, 32(2): 419-430.
[12] Noel S, Jacobs M, Kalapa P, et al. Multiple Coordinated Views for Attack Graphs[C]//Proc. of the IEEE Workshops on Visualization for Computer Security. Washington D. C., USA: IEEE Computer Society, 2005.
[13] Ning P, Cui Yun, Reeves D S, et al. Techniques and Tools for Analyzing Intrusion Alerts[J]. ACM Transactions on Information and System Security, 2004, 7(2): 274-318.
[14] Defcon17 Hacking Conference. Capture the Flag(CtF) Pac- kets[EB/OL]. (2012-02-27). http://www.defcon.org.
编辑 顾姣健 |