|
[1]劉其堅,「多型性弱點資料庫設計與對應缺陷運用程式產生器製作」,中原大學資訊工程研究所,碩士論文,中華民國89年六月。[2] 陳宗裕,「支援弱點稽核與入侵偵測之整合性後端資料庫設計研究」,中原大學資訊工程研究所,碩士論文,中華名國90年七月。[3]“Snort Rule Database”.<http://www.snort.org/Database/rules.asp> (12 Sep 2001)[4] Security Focus .“IDS”. <http://www.securityfocus.com> (20 Sep 2001)[5]Common Vulnerabilities and Exposures .“CVE”. <http://cve.mitre.org> (13 Sep 2001)[6]NSA Glossary of Terms Used in Security and Intrusion Detection. SANS Institute” .<http://www.sans.org/newlook/resources/glossary.htm> (21 Sep 2001)[8]Julia Allen ,Alan Christie ,William Fithen ,John McHugh ,Jed Pickel and Ed Stoner.State of the Practice of Intrusion Detection Technologie , 120[9]Gula, Ron. “Broadening the Scope of Penetration Testing Techniques”. <http://www.securityfocus.com/templates/forum_message.html?forum=2&head=7&id=7> (15 Oct 2001)[10]Farmer, Dan and Venema Wietse ,“Improving the Security of Your Site by Breaking Into It”,<http://www.clark.net/pub/roesch/public_html/improve_by_breakin.txt> ( 02 Oct 2001)[11]Nmap ,“IDS”,<http://www.nmap.com> (21 Oct 2001)[12]The Nessus Project ,“Documentation”,<http://www.nessus.org> (01 Nov 2001)[13]Renaud Deraison.The Nessus Attack Scripting Language Reference Guide,Version 1.0.0 , pre2 .[14]BIND vulnerable to overflows, “Nessus Login”,<http://cgi.nessus.org/plugins/dump.php3?id=10605> plugin ID:10605 (23 Nov 2001)[15]Wenke Lee and Salvatore J. Learning Patterns from Unix Process Execution Traces for Intrusion Detection ,Proc. AAAI-97 Work. on AI Methods in Fraud and Risk Management , 1997.[16]林秉忠、歐士源、劉其堅、賴冠州、黃世昆。「攻擊模式、入侵事件、與弱點缺陷資料庫分析研究」。中研院資科所 (2000)。[17]Snort,<http://www.snort.org/> (13 Dec 2001)[18]The Packet Capture library, (27 Dec 2001)[19]Martin Roesch,“Writing Snort Rules:How to write Snort rules and keep your sanity”,Current as of version 1.7,<http://www.snort.org/writing_snort_rules.htm> (12 Nov 2001)[20]取自Snort 程式套件,<http://www.snort.org/Files/snort-1.8p1.tar.gz> (13 Nov 2001)[21]CERT Coordinate Center,“Carnegie Mellon Software Engineering Institute”<http://www.cert.org/advisories/> (29 Dec 2001)[22]臺灣電腦網路危機處理中心,<http://www.cert.org.tw> (11 Nov 2001)[23]SecurityFocus.com,<http://www.securityfocus.com> (13 Nov 2001)[24]SecurityPortal:An atomic tangerine site,<http://www.securityportal.com> (15 Oct 2001)[25]redhat ,“Support and Docs”<http://www.redhat.com/apps/support/updates.html> (2 Jan 2002)[26]MandrakeSoft , <http://www.linux-mandrake.com/en/security/> (2 Jan 2002)[27]Rootshell , <http://www.rootshell.com> (23 Nov 2001)[28]Security Bugware ,<http://161.53.42.3/~crv/security/bugs/list.html> (13 Dec 2001)[29]Assessment Section ,“Packet Storm”<http://packetstorm.securify.com/assess.html> (20 Dec 2001)[30]Whitehats arachnids , <http://www.whitehats.com/ids/index.html> (13 Nov 2001)[31]World Wide Web Consortium , <http://www.w3c.org> (28 Dec 2001)[32]Huang, Hung-Hsuan,Web Navigation Description Language,IIS Sinica,2 Aug 2000。[33]Requirements and Recommendations for CVE Compatibility,<http://cve.mitre.org/compatible/requirements.html> (13 Dec 2001)[34]DBMaker , <http://www.dbmaker.com> (2 Jan 2002)[35]PHP:Hypertext Preprocessor , <http://www.php.org> (3 Jan 2002)[36]The Internet Engineering Task ForceIETF , <http://www.ietf.org> (3 Jan 2002)[37]IDMEF, “Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML) DTD”,<http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-03.txt> (3 Jan 2002)[38] 弱點對於風險與時間的關係圖 <http://www.counterpane.com/> (3 Jan 2002)[39] Ronald W. Ritchey Paul Ammann , ”Using Model Checking to Analyze Network Vulnerabilities” , Security and privacy, 2000. S&p; 2000. Proceedings. 2000 IEEE symposium on page(s): 156 — 165 , 14-17 may 2000[40] Victor C. S. Lee John A. Stankovic, and Sang H. Son , “Intrusion Detection in Real-time Database Systems Via Time Signatures“ , Proceedings of the Sixth IEEE Real Time Technology and Applications Symposium (RTAS 2000) , 2000[41] Cert.org , < http://www.cert.org/ > (30 Jun 2002)
|