|
[1]J. Klensin, AT&T Laboratories, "SIMPLE MAIL TRANSPORT PROTOCOL" , RFC2821, April, 2001 [2]David Harris, "Drowning in Sewage", at: http://www.ictlex.net/wp-content/spamwp.pdf [3]Openfind, at: http://www.openfind.com.tw [4]Qiu Xiaofeng, Hao Kihong, Chen Ming. "Flow-Based Anti-Spam", IP Operations and Management, 2004. Proceedings IEEE Workshop on 11-13 Oct. 2004 Page(s): 99-103 [5]Satio T, “Anti-SPAM System: Another Way of Preventing Spam”, Database and Expert System Applications, 2005. Proceeding. Sixteeth International Workshop on 22-26 Aug. 2005 Page(s): 57-61 [6]The History and Future of SMTP, at: http://www.freesoftwaremagazine.com/articles/focus_spam_smtp/ [7]History of SMTP, at: http://www.circleid.com/posts/history_of_smtp/ [8]Suzanne Sluizer, Jonathan B. Postel, “MAIL TRANSFER PROTOCOL”, RFC780, May, 1981 [9]Jonathan B. Postel, “SIMPLE MAIL TRANSFER PROTOCOL”, RFC788, November, 1981 [10]David H. Crocker, John J. Vittal, “STANDARD FOR THE FROMAT OF ARPA NETWORK TEXT MESSAGE(1)”, RFC733, November, 1977 [11]Jonathan B. Postel, “SIMPLE MAIL TRANSFER PROTOCOL”, RFC821, August, 1982 [12]David H. Crocker, “STANDARD FOR THE FROMAT OF ARPA NETWORK TEXT MESSAGE”, RFC822, Augest 13 1982 [13]J. Klensin, WG Chair, “SMTP Service Extensions”, RFC1425, February 1993 [14]P. Resnick, “Internet Message Format”, RFC2822, April 2001 [15]Craig Partridge, “MAIL ROUTIGN AND THE DOMAIN SYSTEM”, RFC974, Janurary 1986 [16]Wikipedia, “firewall”, at: http://zh.wikipedia.org [17]Massachusetts Institute of Technology, at: http://web.mit.edu/ [18]王岳中, “防護邊界安全-防火牆”, at: http://www.eisi.com.tw/asp/index.asp [19]Rebecca Bace, Peter Mell, “Intrusion Detection Systems(IDS)” NIST SP800-31, July 2002. [20]Price, K.E. “Host-Based Misuse Detection and Conventional Operating Systems Audit Data Collection.”Master thesis, Purdue University, December 1997. [21]Ricky M. Magalhaes, “Host-Based IDS vs Network-Based IDS”, at http:// http://www.windowsecurity.com/, Jul 23, 2004 [22]Przemyslaw Kazienko & Piotr Dorosz, “Intrusion Detection Systems (IDS) Part 2 - Classification; methods; techniques”, Jun 15, 2004 [23]Jason Larsen & Jed Haile, “Understanding IDS Active Response Mechanisms”, Jan 29, 2002 [24]Erwan, Lemonnier “Protocol Anomaly Detection in Network-based IDSs” Defcom Sweden, Stockholm, 28 June 2001 [25]Kumar Das, “Protocol Anomaly Detection for Network-based Intrusion Detection”, SANS, August, 13,2001 [26]Marcus Ranum, “What is Deep Inspection” at: http://www.ranum.com/security/computer_security/editorials/deepinspect/index.html [27]Symantec, “Symantec Internet Security Threat Report” Trends for January 05 – June 05, September 2005 [28]Check Point, “Protocols and Related Defenses – Application Layer”, at: http://www. checkpoint.com/appint/appint_application_layer.html [29]Gordano, “Gordano Knowledge Base - Do partial messages bypass SMTP Content Protection? ”, at: http://www.gordano.com/ [30]Infopeople, “Network Security - Basic Firewall Configuration”, at: http://www.infopeople.org/ [31]Syngress, “Attack Detection and Defense”, at: http://www.syngress.com/book_catalog/312_NetScr/sample.pdf [32]David Harris, "Drowning in Sewage", at: http://www.ictlex.net/wp-content/spamwp.pdf [33]Felipe Arboleda, Edward Bedón, “Snort diagrams for developers”, April 2005, at: http://www.snort.org/ [34]Raven Alder, Jacob Babbin, SYNGRESS, “Snort 2.1 Intrusion Detection”, Second Edition, May 2004 [35]Drumea, A.; Popescu, C., “Finite State Machines and their Application in Software for Industrial Control”, Electronics Technology: Meeting the Challenges of Electronics Technology Progress, 2004. 27th International Spring Seminar on Volume 1, 13-16 May 2004 Page(s):25 - 29 vol. [36]F. Wanger, “Moore or Mealy model”, at: http://www.stateworks.com/active/content/en/product/links.php [37]N. Brwnlee, C. Mills, “Traffic Flow Measurement: Architecture”, RFC 2722, Oct 1999 [38]At: http://www.webopedia.com/TERM/F/FQDN.html [39]Benny Pinkas, “Securing Passwords Against Dictionary Attacks”, Proceedings of the ACM Computer and Communications Security Conference, November 2002. [40]F. Wang , “What’s All This State Machine Stuff”, March 2006 [41]R. Sekar, A. Gupta, “Specification-based Anomaly Detection: A New Approach for Detecting Network Intrusions”, Proceedings of the 9th ACM conference on Computer and communications security, 2002 [42]Livemore Software Laboratories, “PORTUS SMTP Application Defenses”, September 2004 [43]MIT Lincoln Laboratory, at: http://www.ll.mit.edu/ [44]CiperTrust, “What E-mail Hackers Know That You Don’t”, October 2005 [45]SNORT.ORG, at http://www.snort.org/ [46]N. Freed, N. Borenstein, “Multipurpose Internet Mail Extensions”, RFC2045, November, 1996
|