|
[1]S. Northcutt, J. Novak, “Network Intrusion Detection: An Analyst’s Handbook”, New Riders Press[2]A. Householder, A. Manion, L. Pesante, G. M. Weaver, ”Managing the Threat of Denial-of- Service Attacks”, CERT® Coordination Center, http://www.cert.org/archive/pdf/Managing_DoS.pdf[3]A. Sundaram, “An Introduction to Intrusion Detection”, ACM Crossroads Student Magazine, http://www.acm.org/crossroads/xrds2-4/intrus.html[4] B. C. Soh, T.S. Dillon, ”Setting Optimal Intrusion-Detection Thresholds”, Computers and Security, Vol.14, 1995, pp. 621-631[5]M. Iguchi and S. Goto, “Detection Malicious Activities through Port Profiling”, IEICE Transactions on Information and Sytems, Vol.E82-D, no.4, April 1999, pp. 784 - 792[6] N. Kato, H. Nitou, K. Ohta, G. Mansfield, Y. Nemoto, “A Real-Time Intrusion Detection System (IDS) for Large Scale Networks and Its Evaluation”, IEICE Transactions on Communications, Vol.E82-B, no. 11, November 1999, pp. 1817-1825[7]D. E. Denning, “An Intrusion-Detection Model”, IEEE Transactions on Software Engineering, Vol. SE-13, no. 2, pp. 222-232, February 1987[8]E. Lundin, E. Jonsson, “Anomaly-Based Intrusion Detection: Privacy Concerns and Other Problem”, Computer Networks, Vol. 34, 2000, pp. 623 - 640[9] G. Helmer, J. Wong, S. Madaka, “Anomalous intrusion detection system for hostile Java applets”, Journal of Systems and Software Volume: 55, Issue: 3, January 15, 2001, pp. 273-286[10] S. P. Shieh, V. D. Gligor, “On a Pattern-Oriented Model for Intrusion Detection”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 9, NO. 4, JULY/AUGUST 1997, pp.661-667[11] 閻雪, “中國大陸的駭客技術”, 2001, 松崗[12] W.R. Stevens, “TCP/IP Illustrated Volume 1”, Addison Wesley[13] K. Y. Lam, L. Hui, S. L. Chung, “A Data Reduction Method for Intrusion Detection”, System Software, Vol. 33, 1996, pp 101 - 108[14] CERT® (Computer Emergency Response Team) http://www.cert.org/[15] The Open Source Network Intrusion Detection System, http://www.snort.org/
|