3[4]IETF.Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML)Document Type Definition.http://www.ietforg/internet-draftsdraft-ietf-idwg-idmef-xml-10txt,2003-1-10 被引量:1
5[7]POUGET F, HOLZ T. A Pointillist Approach for Comparing Honeypots[A]. Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment[C].[S.l.]:[s.n.], 2005. 被引量:1
6[9]Spitzner L. Honeypot Farms[EB/OL].[S.l.]:[s.n.],2003-08[2005-08-11]. http://www. securityfocus. com/infocus/1720. 被引量:1
7[1]SPITZNER L. Honeypots:追踪黑客[M]. 邓云佳. 北京:清华大学出版社, 2004:215-221. 被引量:1
8[2]MOORE D, SHANNON C, GEOFFREY M, et al. Telescopes:Technical report.[S.l.]:CAIDA Project, 2004-08[2005-08-08]. http://www. caida. org/outreach/papers/2004/tr-2004-04/. 被引量:1
9[3]The Team Cymru Darknet Project. Darknet Homepage[EB/OL].[S.l.]:[s.n.],2004[2005-08-01]. http://www. cymru. com/Darknet/. 被引量:1
10[4]PROVOS N. Honeyd Homepage. [S.l.]:[s.n.],2005-08[2005-08-07]. http://www. honeyd. org/. 被引量:1