|
[1]楊子翔、蔡錫鈞, “Network DoS/DDoS 攻擊及預防方法之研究”, TANET2000. [2]Paul Innella, "The Evolution of Intrusion Detection Systems," TDI Article Published in SecurityFocus, November 16, 2001. [3]Lance Spitzner, "Honeypots: Tracking Hackers," ISBN 0-321-10895-7 2nd Printing, October 2002. [4]Happy Hacker, Inc."Hacker Wargames! Hack these computers -- please!" from http://www.happyhacker.org/wargame/index.shtml [5]Cisco System, Inc. "White Paper: NetFlow Services and Applications,"http://www.cisco.com/warp/public/cc/pd/iosw/ioft/neflct/tech/napps_wp.htm [6]Christine Tan and Sonia Fahmy, "Packet fields in IDS Rules & Taxonomy of Dos/DDos attacks,"Research Notes from http://www.cra.org/Activities/craw/dmp/awards/2003/Tan/research/ [7]Sans Institute, "The History and Evolution of Intrusion Detection," 2001. [8]Mark Webb-Johnson, "Intrusion Detection & Prevention,"HKCERT Events 096. Available from http://www.hkcert.org/ppt/event096/idp.pdf [9]Anderson, James P., Computer Security Threat Monitoring and Surveillance. James P. Anderson Co., Fort Washington, Pa., 1980. [10]Heberlein, L. et al. "A Network Security Monitor." Proceedings of the IEEE Computer Society Symposium, Research in Security and Privacy, May 1990, pp. 296-303. [11]The NSS Group Report, "NetScreen-IDP 500 V3.0 Technical Evalution,"http://www.juniper.net/products/intrusion/ns_idp_500_wp_nss.pdf [12]DEFCON, http://www.defcon.org/ [13]eWeek magazine, "Open Hack III - Grand Prize $50,000" from http://itrain.org/itinfo/2001/it010116.html [14]Hackerslab, Inc. "Free Hacking Zone," from http://www.hackerslab.org [15]Hackerslab, Inc. "King of fighter 2002 contest," from http://kof.hackerslab.org [16]Hackerleon Collections, "Hacking Laboratory," from http://hackerleon.cybersoldier.net/lab.htm [17]Ming-Yueh Chuang and Ren-Hung Hwang, "The Wargame Research," ICOS2003. http://twopensource.org/icos03/archives/cat_14accept.html [18]Hacking Contest Web Site, http://hack.datafort.net/ [19]InMon Corporation Products, "InMon Traffic Server" from http://www.inmon.com [20]Flow-tools information, http://www.splintered.net/sw/flow-tools/ [21]Samplicator Software, http://www.switch.ch/tf-tant/floma/sw/samplicator/ [22]Patrick S. Harper, "Snort, Apache, PHP, MySQL, ACID on Redhat 9.0 Installation Guide," available from http://www.snort.org/docs/snort_acid_rh9.pdf [23]Cisco System, Inc. "White Paper: Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks" http://www.cisco.com/warp/public/707/newsflash.pdf [24]Sourcefire, Inc. "Snort Users Manual," from http://www.snort.org/docs/writing_rules/
|