1P Vcissimo,N F Neves,M Correial Intrusion-tolerant archi-tectures:Concepts and design[R].Department of ComputerSeience,Univensity of Lisboa.Tech Rep:DIPFCUL TR0325,2004. 被引量:1
6The honeynet project: Know your enemy. 2002,12, http://www.linuxsecurity.com/teature stories/honevnet-review-kye.html. 被引量:1
7Klug D. Honeypots and intrusion detection. 2000.9.13,www. san.org/in fosecfaq/honeypots. 被引量:1
8Levine J, LaBella R, Owen H, Contis D, Culver B. The use of honeynets to detect exploited systems across large enterprise networks. Proc. of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY,June 2003,www. tracking-hackers.com/papers/gatech-honeynet.pdf. 被引量:1
9Nathalie Weiler. Honeypots for distribute denial of service attacks. 2002, 10, htp://www. tik.ee.cthz.ch/-weiler/papers/wetice02.pdf. 被引量:1