參考文獻 |
中文參考文獻:
[余俊賢 2010] 余俊賢,「後個資法時代之Log安全稽核記錄管理」,資安人雜誌No.69 Page(s): 88–91, May/June 2010。
[微軟 2010] 台灣微軟,「新版個資法上路,企業 IT 機不可失」,2010。 http://download.microsoft.com/download/5/4/C/54CC1721-F3F6-4F79-8221-52428FB27669/PrivacyIssue_0520.pdf
[曾俊豪 2009] 曾俊豪、陳奕明,「具隱私防護與分析能力之網路封包酬載轉換機制」,台灣網際網路研討會 (TANET),2009。
[蘇漢君 2009] 蘇漢君,「小型資通安全營運中心聯防系統之研究與應」,資訊管理學術與實務研討會,2009。
[林昶志 2008] 林昶志,「具隱私防護與關聯能力之資安警訊轉換機制研究」,國立中央大學資訊管理學系碩士論文,2008。
[郭木興2008] 郭木興、陳良駒、張志豪、楊誌瑋,「動態資訊安全聯防架構之最適決策研究」,資訊、科技與社會學報,2008。
[徐國鈞 2008] 徐國鈞、羅豐彬、郭建麟,「探討組織如何落實ISO 27001-以網路入侵衍生危安事件為例」,台灣網際網路研討會 (TANET),2008。
[樊國楨 2006] 樊國楨、林樹國、歐崇明,「資安監控中心之終極目標:資訊分享與分析中心初探」,資通安全分析專論T95002,2006。
[郭香吟 2006] 郭香吟,「自風險管理觀點探討資安監控中心建置契約之研究」,國立清華大學科技法律研究所碩士論文,2006。
[陳志安2000] 陳志安,「以屬性導向歸納法挖掘資料異常之研究」,國立中央大學資訊管理學系碩士論文,2000。
英文參考文獻:
[ALJ 2008] Almgren, M. , Lindqvist, U. and Jonsson, E. , “A multi-sensor model to improve automated attack detection,” in Proceedings of the 11th international symposium on recent advances in intrusion detection, Page(s):291–310, 2008.
[BBB 2008] Burkhart, M. , Brauckhoff, D. and Boschi, E. , “The risk-utility tradeoff for IP address truncation,” Conference on Computer and Communications Security, Proceedings of the 1st ACM workshop on Network data anonymization, 2008.
[CLF 2003] Cheung, S. , Lindqvist, U. and Fong, M. W. , “Modeling Multistep Cyber Attacks for Scenario Recognition,” DARPA Information Survivability Conference and Exposition (DISCEX III), 2003.
[CM 2002] Cuppens, F. and Miège, A. , “Alert Correlation in a Cooperative Intrusion Detection Framework,” IEEE Symposium on Research in Security and Privacy, 2002.
[CUPP 2001] Cuppens, F. , “Managing alerts in a multi-intrusion detection environment,” in Proceedings of the 17th annual computer security applications conference (ACSAC) , Page(s):22–31, 2001.
[CVE] Common Vulnerability and Exposure, “National Vulnerability Database,” 2010. http://web.nvd.nist.gov/view/vuln/statistics-results?cid=2
[CWKMR 2008] Coull, S. E. , Wright, C. V. , Keromytis, A. D. , Monrose, F. and Reiter, M. K. , “Taming the Devil: Techniques for Evaluating Anonymized Network Data,” in Proceedings of the 15th Annual Network and Distributed System Security Symposium, 2008.
[DW 2001] Debar, H. and Wespi, A. , “Aggregation and correlation of intrusiondetection alerts,” in Proceedings of the 4th international symposium on recent advances in intrusion detection (RAID), Page(s):85–103, 2001.
[FLEG 2007] Flegel, U. , “Privacy-Respecting Intrusion detection,” volume 35 in Advances in Information Security, Springer, Page(s):62.107.325, 2007 .
[FMB 2008] Farroukh, A. , Mukadam, N. and Bassil, E. , “Distributed and Collaborative Intrusion Detection Systems,” American University of Beirut, 2008
[GBB 2007] Ganame, A. K. , Bourgeois, J. and Bidou, R. , “A Global Security Architecture for Intrusion Detection on Computer Networks,” Universit de Franche Comt, 2007.
[JULI 2001] Julisch, K. , “Mining alarm clusters to improve alarm handling efficiency,” in Proceedings of the 17th annual computer security applications conference (ACSAC) , Page(s): 12–21, 2001.
[KING 2008] King, J. , “A Taxonomy, Model, and Method for Secure Network Log Anonymization,” Master's Thesis, University of Illinois at Urbana-Champaign, Apr., 2008.
[LPS 2004] Lincoln, P. , Porras, P. and Shmatikov, V. , “Privacy-Preserving Sharing and Correlation of Security Alerts,” in 13th USENIX Security Symposium, 2004.
[LS 2007] Loukides, G. and Shao, J. , “Capturing Data Usefulness and Privacy Protection in K-Anonymisation,” SAC07, March 11-15, 2007.
[NCR 2002] Ning, P. , Cui, Y. and Reeves, D. S. , “Constructing Attack Scenarios through Correlation of Intrusion Alerts,” in Proceedings of the 9th ACM Conference on Computer & Communications Security, page(s):245-254, November 2002.
[NZ 2007] Niu, Y. and Zhang, Q. , “Security Operation Center Based on Immune System,” Computational Intelligence and Security Workshops, Page(s):97-103, 2007.
[QIN 2005] Qin, X. , “A probabilistic-based framework for infosec alert correlation,” Ph. D. dissertation, Atlanta, GA, USA: Georgia, Institute of Technology, 2005.
[QUIN 1986] Quinlan, J. R. , “Induction of Decision Trees,” Machine learning, Vol. 1, Page(s):81-106, 1986.
[RC 2001] Dain, O. and Cunningham, R. , “Fusing a heterogeneous alert stream into scenarios,” in Proceedings of the 2001 ACM workshop on data mining for security applications, Page(s):1–13, 2001.
[RCMT 2008] Ribeiro, B. , Chen, W. , Miklau, G. and Towsley, D. , “Analyzing Privacy in Enterprise Packet Trace Anonymization,” in Proceedings of the 15 th Network and Distributed Systems Security Symposium, 2008.
[RW 2007] Ramaswamy, R. and Wolf, T. , “High-Speed Prefix-Preserving IP Address Anonymization for Passive Measurement Systems,” IEEE/ACM transactions on NETWORKING, VOL.15, NO.1, 2007.
[SS 1998] Samarati, P. and Sweeney, L. , “Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression,” SRI Technical Report SRICSL-98-04, 1998.
[STAN 2002] Staniford, S. , “Practical automated detection of stealthy portscans,” Journal of Computer Security, Page(s):105–36, 2002.
[SWEE 2002] Sweeney, L. , “k-anonymity: A model for protecting privacy,” International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002.
[SYMA 2010] Symantec Corporation, “Symantec Global Internet Security Threat Report,” 2010.http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf
[TMI 2007] Takemori, K. , Miyake, Y. and Ishida, C. , “A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns,” Intelligence and Security Informatics, 2007 IEEE , page(s): 172-179, 2007.
[VK 2001] Valdes, A. and Skinner, K. , “Probabilistic alert correlation,” in Proceedings of the 4th international symposium on recent advances in intrusion detection (RAID), Page(s):54–68, 2001.
[WLFW 2006] Chi-Wing Wong, R. , Li, J. , Wai-Chee Fu, A. and Wang, K. , “(α,k)-Anonymity: An Enhanced-Anonymity Model for Privacy-Preserving Data Publishing,” KDD’06, 2006.
[XFA 2007] Xu, J. , Fan, J. and Ammar, M. H. , “High-Speed Prefix-Preserving IP Address Anonymization for Passive Measurement Systems,” IEEE/ACM Transactions on Networking, Volume 15, 2007.
[XKHRZ 2004] Xie, Y. , Kim, H. , Hallaron, D. O. , Reiter, M. and Zhang, H. , “Seurat: a pointillist approach to anomaly detection,” in Proceedings of the 7th international symposium on Recent Advances in Intrusion Detection (RAID), Page(s): 238–57, 2004.
[XN 2005] Xu, D. and Ning, P. , “Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach,” Annual Computer Security Applications Conference, 2005.
[XN 2006] Xu, D. and Ning, P. , “A Flexible Approach to Intrusion Alert Anonymization and Correlation,” Securecomm and Workshops, Page(s): 1-10, 2006.
[XWW 2006] Xu, J. , Wang, W. and Wang, X. , “UtilityBased Anonymization for Privacy Preservation with Less Information Loss,” 12th ACM SIGKDD, 2006.
[YZ 2008] Yu, S. and Zhou, W. , “Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks,” Sixth Annual IEEE, 2008.
[ZG 2006] Zhu, B. and Ghorbani, A. A. , “Alert Correlation for Extracting Attack Strategies,” International Journal of Network Security, Vol. 3, No. 3, Page(s):244-258, Nov. 2006.
[ZLK 2010] Zhou, C. V. , Leckie, C. and Karunasekera, S. , “A survey of coordinated attacks and collaborative intrusion detection,” Computers & Security, 2010.
[ZLK 2009] Zhou, C. V. , Leckie, C. and Karunasekera, “Collaborative detection of fast flux phishing domains,” Journal of Networks, Page(s): 75–84, 2009.
[ZYW 2005] Zhong, S. , Yang, Z. and Wright, R. N. , “Privacy Enhancing k-Anonymization of Customer Data,” Principles of Database Systems, 2005.
|