[1] |
石乐义, 姜蓝蓝, 贾春福 ,等. 蜜罐诱骗防御机理的博弈理论分析[J]. 电子与信息学报, 2012,34(6): 1420-1424.
|
|
SHI L Y , JIANG L L JIA C F ,et al. A game theoretic analysis for the honeypot deceptive mechanism[J]. Journal of Electronics &Information Technology, 2012,34(6): 1420-1424.
|
[2] |
诸葛建伟, 唐勇, 韩心慧 ,等. 蜜罐技术研究与应用进展[J]. 软件学报, 2013,24(4): 825-842.
|
|
ZHUGE J W , TANG Y , HAN X H ,et al. Honeypot technology research and application[J]. Journal of Software, 2013,24(4): 825-842.
|
[3] |
NASIR Q AL-MOUSA Z A . Honeypots aiding network forensics:challenges and notions[J]. Journal of Communications, 2013,8(11): 53-84.
|
[4] |
PHAM V H , DACIER M . Honeypot trace forensics:The observation viewpoint matters[J]. Future Generation Computer Systems-The International Journal Of Escience, 2011,27(5): 539-546.
|
[5] |
MARCHESE M , SURLINELLI R , ZAPPATORE S . Monitoring unauthorized internet accesses through a 'honeypot' system[J]. International Journal Of Communication Systems, 2011,24(1): 75-93.
|
[6] |
YANG H S . A study on attack information collection using virtualization technology[J]. Multimedia Tools and Applications, 2015,74(20): 8791-8799.
|
[7] |
郭军权, 诸葛建伟, 孙东红 ,等. Spampot:基于分布式蜜罐的垃圾邮件捕获系统[J]. 计算机研究与发展, 2014,51(5): 1071-1080.
|
|
GUO J Q , ZHUGE J W , SUN D H ,et al. Spampot:A spam capture systems based on distributed honeypot[J]. Journal of Computer Research and Development, 2014,51(5): 1071-1080.
|
[8] |
ZHAN Z X , XU M C , XU S H . Characterizing honeypot-captured cyber attacks:statistical framework and case study[J]. Transactions on Information Forensics and Security, 2013,8(11): 1775-1789.
|
[9] |
WANG K , DU M , MAHARJAN S ,et al. Strategic honeypot game model for distributed denial of service attacks in the smart grid[J]. Transactions on Smart Grid, 2017,8(5): 2474-2482.
|
[10] |
LA Q D , QUEK T , LEE J ,et al. Deceptive attack and defense game in honeypot-enabled networks for the internet of things[J]. Internet of Things Journal, 2016,3(6): 1025-1035.
|
[11] |
AKIYAMA M , YAGI T , YADA T ,et al. Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots[J]. Computers & Security, 2017,69: 155-173.
|
[12] |
BABU M R , USHA G . A novel honeypot based detection and isolation approach (NHBADI) to detect and isolate black hole attacks in manet[J]. Wireless Personal Communications, 2016,90(2SI): 831-845.
|
[13] |
SELVARAJ R , KUTHADI V M , MARWALA T . Ant-based distributed denial of service detection technique using roaming virtual honeypots[J]. IET Communications, 2016,10(8): 929-935.
|
[14] |
JIANG C B , LIU I H , CHUNG Y N ,et al. Novel intrusion prediction mechanism based on honeypot log similarity[J]. International Journal Of Network Management, 2016,26(3): 156-175.
|
[15] |
ZHANG W Z , HE H , KIM T H . Xen-based virtual honeypot system for smart device[J]. Multimedia Tools and Applications, 2015,74(19): 8541-8558.
|
[16] |
GHOURABI A , ABBES T , BOUHOULA A . Characterization of attacks collected from the deployment of Web service honeypot[J]. Security And Communication Networks, 2014,7(2): 338-351.
|
[17] |
KIM H G , KIM D , CHO S J ,et al. Efficient detection of malicious web pages using high-interaction client honeypots[J]. Journal of Information Science and Engineering, 2012,28(5): 911-924.
|