[1] |
Dynamic honeypots[EB/OL]. , 2003.
|
[2] |
KUWATLY I , SRAJ M , MASRI Z . A dynamic honeypot design for intrusion detection[A]. IEEE/ACS International Conference on Pervasive Services[C]. Beirut,Lebanon, 2004. 95-104.
|
[3] |
HIEB J , GRAHAM J . Anomaly-Based Intrusion Detection for Network Monitoring Using a Dynamic Honey Pot[R]. 2004.
|
[4] |
HECKER C , NANCE K , HAY B . Dynamic honeypot construction[A]. Proceedings of the 10th Colloquium for Information Systems Securit Education[C]. Maryland,USA, 2006. 95-102.
|
[5] |
陈启璋, 林国恩, 李建彬 . 一种基于动态蜜罐和实时仿真的蜜网设计[J]. 微计算机信息, 2006,22(36): 28-30. CHEN Q Z , LIN G N , LI J B . Honeynet design based on dynamic honeypot & real-time emulation[J]. Control & Automation, 2006,22(36): 28-30.
|
[6] |
BLAKE K , CONVERSE V , EDMARK R ,et al. Method and System for Morphing Honey-Pot[R]. 2008.
|
[7] |
SARDANA A , JOSHI R . An integrated honeypot framework for proactive detection,characterization and redirection of attacks at ISP level[J]. Journal of Information Assurance & Security, 2008,3(1): 1-15.
|
[8] |
KHATTAB S , SANGPACHATANARUK C , MOSSE D ,et al. Roaming honeypots for mitigating service-level denial-of-service attacks[A]. ICDCS2004[C]. Tokyo,Japan, 2004. 328-337.
|
[9] |
MILLS D . Simple Network Time Protocol[S].
|
[10] |
BADISHIY G , HERZBERG A , KEIDAR I ,et al. Keeping denial-ofservice attackers in the dark[J]. IEEE Transactions on Dependable and Secure Computing, 2007,4(3): 191-204.
|
[11] |
石乐义, 贾春福, 吕述望 . 基于端信息跳变的主动网络防护研究[J]. 通信学报, 2008,29(2): 106-110. SHI L Y , JIA C F , LV S W . Research on end hopping for active network confrontation[J]. Journal on Communications, 2008,29(2): 106-110.
|
[12] |
SHI L , LI J . Research on synchronization strategies for network confrontation[A]. WiCOM2010[C]. Chengdu,China, 2010. 1-4.
|