[1]趨勢科技,<2005年第三季病毒綜合報告>,http://www.trendmicro.com,2005年。
[2]王士豪,<基於網路訊務動態基線分析之網路蠕蟲偵測機制>,南投,暨南大學資訊管理學系碩士論文,2004年。[3]王曠銘、羅孟彥、楊竹星,<基於NetFlow之大型網路蠕蟲偵測系統>,臺中,2005台灣網際網路研討會(TANET),Session 30,2005年。
[4]李倫銓,<看不見的殺手? - 談蠕蟲(Worm)與蠕蟲的預警模式>,臺北,HiNet防毒防駭服務技術文章,2004年。
[5]鄭輝,<惡意移動代碼分析與研究>,北京,CERNET第十一屆學術年會,2004年。
[6]CERT Coordination Center, “CERT Advisory CA-1989-04 WANK Worm On SPAN Network,” http://www.cert.org/advisories/CA-1989-04.html.
[7]Honeynet.org, “The Honeynet Project,” http://www.honeynet.org.
[8]Microsoft Corporation, “Microsoft Security Bulletin,” http://www.microsoft.com/technet/security/current.aspx.
[9]Microsoft Corporation, “Microsoft Security Bulletin MS02-039 Buffer Overruns in SQL Server 2000 Resolution Service Could Enable Code Execution,” http://www.microsoft.com/technet/security/bulletin/MS02-039.mspx.
[10]Mldonkey.org, “MLDonkey Project,” http://mldonkey.org.
[11]RFC 1950, “ZLIB Compressed Data Format Specification Version 3.3,” http://www.faqs.org/rfcs/rfc1950.html, May 1996.
[12]SANS Institute, “Lion Worm,” http://www.sans.org/y2k/lion.htm.
[13]Snort.org, “Snort, the Open Source Network Intrusion Detection System,” http://www.snort.org.
[14]Symantec Corporation, “Symantec Security Response,” http://securityresponse.symantec.com.
[15]Symantec Corporation, “Symantec Security Response - Linux.Ramen.Worm,” http://www.symantec.com/avcenter/venc/data/linux.ramen.worm.html.
[16]Symantec Corporation, “Symantec Security Response - W32.Spybot.Worm,” http://www.symantec.com/avcenter/venc/data/w32.spybot.worm.html.
[17]Symantec Corporation, “Symantec Internet Security Threat Report, Trends for July 05-December 05,” http://www.symantec.com, March 2006.
[18]Carter, E. and Hogue, J., Intrusion Prevention Fundamentals, Cisco Press Publishing, January 2006.
[19]Castaneda, F., Sezer, E. C. and Xuy, J., “Worm vs. Worm: Preliminary Study of an Active Counter-Attack Mechanism,” In Proceedings of the 2004 ACM Workshop on Rapid Malcode, pp. 83-93, October 2004.
[20]Ellis, D., Aiken, J., Attwood, K. and Tenaglia, S., “A Behavioral Approach to Worm Detection,” In Proceedings of the 2004 ACM Workshop on Rapid Malcode, pp. 43-53, October 2004.
[21]Erbschloe, M., Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code, Butterworth-Heinemann Publishing, August 2004.
[22]Estan, C. and Varghese, G., “New Directions in Traffic Measurement and Accounting,” In Proceedings of the 2002 ACM Conference of the Special Interest Group on Data Communication (SIGCOMM), pp. 323-336, August 2002.
[23]Estan, C., Varghese, G. and Fisk, M., “Bitmap Algorithms for Counting Active Flows on High Speed Links,” In Proceedings of the 2003 ACM Internet Measurement Conference, pp. 153-166, October 2003.
[24]Forman, G., Eshghi, K. and Chiocchetti, S., “Finding Similar Files in Large Document Repositories,” In Proceeding of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 394-400, August 2005.
[25]Jung, J., Paxson, V., Berger, A. W. and Balakrishnan, H., “Fast Portscan Detection Using Sequential Hypothesis Testing,” In Proceedings of the 2004 IEEE Symposium on Security and Privacy, pp. 211-225, May 2004.
[26]Kim, H. A. and Karp, B., “Autograph: Toward Automated Distributed Worm Signature Detection,” In Proceedings of the 13th USENIX Security Symposium, pp. 271-286, August 2004.
[27]Kreibich, C. and Crowcroft, J., “Honeycomb: Creating Intrusion Detection Signatures Using Honeypots,” ACM SIGCOMM Computer Communication Review, Vol. 34, No. 1, pp. 51-56, January 2004.
[28]Lehtinen, R., Computer Security Basics, 2nd Edition, O'Reilly Publishing, June 2006.
[29]McGraw, G., Software Security: Building Security In, Addison Wesley Publishing, January 2006.
[30]Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S. and Weaver, N., “Inside the Slammer Worm,” IEEE Security and Privacy, Vol. 1, No. 4, pp. 33-39, July 2003.
[31]Moore, D., Shannon, C. and Brown, J., “Code-Red: A Case Study on the Spread and Victims of an Internet Worm,” In Proceedings of the 2002 ACM Internet Measurement Workshop, pp. 273-284, November 2002.
[32]Moore, D., Shannon, C., Voelker, G. M. and Savage, S., “Internet Quarantine: Requirements for Containing Self-Propagating Code,” In Proceedings of the 2003 IEEE Computer and Communications Societies, pp. 1901-1910, March 2003.
[33]Newsome, J., Karp, B. and Song, D., “Polygraph: Automatically Generating Signatures for Polymorphic Worms,” In Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 226-241, May 2005.
[34]Northcutt, S., Zeltser, L., Winters, S., Kent, K. and Ritchey, R. W., Inside Network Perimeter Security (2nd Edition), Sams Publishing, March 2005.
[35]Provos, N., “A Virtual Honeypot Framework,” In Proceedings of the 13th USENIX Security Symposium, pp. 1-14, August 2004.
[36]Shoch, J. F. and Hupp, J. A., “The ‘Worm’ Programs – Early Experience with a Distributed Computation,” Communications of the ACM, Vol. 25, No. 3, pp. 172-180, March 1982.
[37]Singh, S., ESTAN, C., VARGHESE, G. and SAVAGE, S., “Automated Worm Fingerprinting,” In Proceedings of the 2004 USENIX Operating Systems Design and Implementation Symposium (OSDI), pp. 45-60, December 2004.
[38]Snoeren, A. C., Partridge, C., Sanchez, L. A., Jones, C. E., Tchakountio, F., Schwartz, B., Kent, S. T. and Strayer, W. T., “Single-Packet IP Traceback,” ACM/IEEE Transactions on Networking, Vol. 10, No. 6, pp. 721-734, December 2002.
[39]Stamp, M., Information Security: Principles and Practice, Wiley Publishing, October 2005.
[40]Staniford, S., Paxson, V. and Weaver, N., “How to 0wn the Internet in Your Spare Time,” In Proceedings of the 11th USENIX Security Symposium, pp. 149-167, August 2002.
[41]Szor, P., The Art of Computer Virus Research and Defense, Addison Wesley Publishing, February 2005.
[42]Warkentin, M. and Vaughn, R., Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, Idea Group Publishing, February 2006.
[43]Weaver, N., Staniford, S. and Paxson, V., “Very Fast Containment of Scanning Worms,” In Proceedings of the 13th USENIX Security Symposium, pp. 29-44, August 2004.
[44]Whyte, D., Kranakis, E. and Oorschot, P. V., “DNS-based Detection of Scanning Worms in an Enterprise Network,” In Proceedings of the 12th Network and Distributed System Security Symposium, February 2005.
[45]Williams, R. N., “A Painless Guide to CRC Error Detection Algorithms,” http://www.repairfaq.org/filipg/LINK/F_crc_v3.html, August 1993.