|
[1]I. Kuwatly, M. Sraj, Zaid A. Masri and H. Artail, “A Dynamic Honeypot Design for Intrusion Detection”, International Conference on Pervasive Services, pp.95-104, 2004. [2]J. Gómez, C. Gil, N. Padilla, R. Baños and C. Jiménez, “Design of a Snort-Based Hybird Intrusion Detection System”, 10th International Work-Conference on Artificial Neural Networks, 2009. [3]K. Zhao, F. Ren, N. and L. Hu, “LDLB: A Light Intrusion Prevention System in Data Link Layer”, 2nd International Conference on Anti-counterfeiting, Security and Identification, pp.190-193, 2008. [4]K. Salah and A. Kahtani, “Improving Snort performance under Linux”, Communications IET, Vol.3, Issue.12, pp. 1883-1895. [5]M. Shouman, A. Salah, and M. Faheem, “Surviving cyber warfare with a hybrid multiagent-based intrusion prevention system”, Potentials, IEEE, Vol.29, Issue.1, pp.32-40, 2010. [6]P. Gupta, C. Raissi, G. Dray, P. Poncelet and J. Brissaud, “SS-IDS: Statistical Signature based IDS”, Fourth International Conference on Internet and Web Applications and Services, pp.407-412, 2009. [7]R.K. Singh and Prof. T. Ramanujam, ”Intrusion Detection System Using Advanced Honeypots”, International Journal of Computer Science and Information Security, Vol.2, No.1, 2009. [8]S. Zaman and F. Karray, “Lightweight IDS based on Features Selection and IDS Classification Scheme”, International Conference on Computational Science and Engineering, pp.365-370, 2007. [9]S.S. Kandeeban and R.S. Rajesh, “Integrated Intrusion Detection System Using Soft Computing”, International Journal of Network Security, Vol.10, No.2, pp.87-92, Mar. 2010 [10]S. Kumar and D. Pant, “Detection and Prevention of New and Unknown Malware using Honeypots”, International Journal on Computer Science and Engineering Vol.1(2), pp.56-61, 2009. [11]X.D. He and T.C. Ling, ”ENHANCED AUTOMATED INTRUSION PREVENTION IN NETWORK SECURITY”, 2nd International Conference on Computer Engineering and Technology, Vol.2, pp.286-291, 2010. [12]Z. Wu, D. Xiao, H. Xu, X. Peng and X. Zhuang, “A Technique of Combining IDS nad IPS Together in Response Intrusion”, First International Workshop on Education Technology and Computer Science, pp.1118-1121, 2009. [13]丁光立、楊中皇,”殭屍網路活動的偵測與阻絕工具研發”,International Conference on Advanced Information Technologies, 2009. [14]鳥哥的Linux私房菜,http://linux.vbird.org/ [15]2010年第三季度惡意軟體報告:超過6億次感染、 Stuxnet蠕蟲、被盜電子證書和漏洞利用程式,2010年12月27日,取自:http://www.kaspersky.com .tw/KL-AboutUs/News2010/12n/1227b.htm [16]去年黑客入侵電腦創新高,2011年 01月 07日,取自:http://www.hkcd.co m.hk/content/2011-01/07/content_2668652.htm [17]金山稱今年木馬等造成損失150億 明年為木馬年,2010年12月28日,取自:http://big5.cri.cn/gate/big5/it.cri.cn/a/11738195.shtml [18]美資安演習 12國參與,2010年10月9日,取自:http://www.libertytimes.c om.tw/2010/new/sep/29/today-int5.htm [19]駭客天堂!臺灣名列全球第四,2010年11月1日,取自:http://www.ithome. com.tw/itadm/article.php?c=63184 [20]駭客攻陷英國皇家海軍網站,2010年11月15日,取自:http://www.ithome. com.tw/itadm/article.php?c=64405 [21]賽門鐵克發表2010年網路安全與儲存趨勢與預測,2011年1月3日,取自:http://www.ithome.com.tw/privacylaw/article/65029 [22]研究:網路攻擊每年造成企業200萬美元損失,2010年3月16日,取自:http://www.zdnet.com.tw/news/web/0,2000085679,20144522,00.htm [23]AKAMAI 公布 2009 年第四季「網際網路現狀報告」,2010年5月30日,取自:http://www.akamai.com/html/about/press/releases/2010/press_042010_t wn.html [24]難以遏止的網路攻擊文化,2010年9月3日,取自:http://www.informationsecurity.com.tw/article/article_detail.aspx?t2id=2&aid=5879 [25]使用雲端服務別輕忽系統安全重要性,2010年6月6日,取自:http://www.informationsecurity.com.tw/article/article_detail.aspx?aid=5760
|