參考文獻 |
[1] 王凱,「我國資訊安全市場發展現況與趨勢」,財團法人資訊工業策進會市場情報中心研究報告,民國 91 年 12 月。
[2] 李勁頤,「利用程序追蹤方法關聯分散式入侵偵測系統之入侵警示研究」,國立中央大學資訊管理學系碩士論文,民國 91 年 6 月。
[3] Simson Garfinkel 及 Gene Spafford 原著,林逸文、蔣大偉翻譯,「UNIX 與 Internet 安全防護 – 網路篇」,第264 至 265 頁,美商歐萊禮台灣分公司,2001 年 12 月。
[4] 曾宇瑞,「網路安全縱深防禦機制之研究」,國立中央大學資訊管理學系碩士論文,民國 89 年 6 月。
[5] Carlton R. Davis 原著,劉良棟翻譯,「IPSec – VPN 安全架構與實作」,9-3 至 9-8 頁,麥格羅‧希爾國際出版公司,民國 91 年 6 月。
[6] 林宸堂,「IPsec VPN 的難題:Firewall 與 NAT 的配置」,http://www.iii.org.tw/ncl/document/IPSecVPN.htm,民國 90 年 9 月。
[7] Power, Richard, “1999 CSI/FBI Computer Crime and Security Survey”, Computer Security Journal, Volume XV, Number 2. San Francisco, CA: Computer Security Institute, 1999.
[8] CERT/CC, “Overview of Attack Trends”, Software Engineering Institute, Carnegie Mellon University, 2002.
(Available at http://www.cert.org/archive/pdf/attack_trends.pdf)
[9] Ed Skoudis, “Infosec’s Worst Nightmares”, Information Security Magazine, November 2002.
(Available at http://www.infosecuritymag.com/2002/nov/nightmares.shtml)
[10] W. R. Cheswick and S. M. Bellovin, “Firewalls and Internet Security, Repelling the Wily Hacker ”, Addision-Wesley Publishing Company, 1994.
[11] DistributedFirewalls.com, http://www.distributedfirewalls.com.
[12] Steven M. Bellovin, “Distributed Firewalls”, ;login:, November 1999, pp. 39-47.
[13] Sotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, and Jonathan M. Smith, “Implementing a Distributed Firewall”, ACM Conference on Computer and Communications Security, Athens, Greece, November 2000.
[14] Wei Li, “Distributed Firewall”, December 2000.
(Available at http://www.cs.helsinki.fi/u/asokan/distsec/documents/li.ps.gz)
[15] Utz Roedig, Ralf Ackermann, and Christoph Rensing et al., “A Distributed Firewall for Multimedia Applications”, Proceedings of the Workshop "Sicherheit in Mediendaten", September 2000.
[16] Steve Bridge, “Achieving Defense-in-Depth with Internal Firewalls”, August 2001. (Available at http://www.sans.org/rr/paper.php?id=797)
[17] Edward Hurley, " Intrusion prevention: IDS' 800-pound gorilla”, http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci892744,00.html, April 2003.
[18] Kathleen A. Jackson, “Intrusion Detection System Product Survey”, June 1999.
[19] Martin Roesch and Chris Green, “Snort Users Manual”, http://www.snort.org/docs/writing_rules/chap2.html#tth_sEc2.3.22, 2003.
[20] Snort inline Projects, http://www.honeynet.org/papers/honeynet/tools/.
[21] FireHOL Project, http://firehol.sourceforge.net/, September 2002.
[22] Nessus Project: A free, powerful, up-to-date and easy to use remote security scanner, http://www.nessus.org/.
[23] SARA Project: Security Auditor's Research Assistant, http://www-arc.com/sara/.
[24] ISS Internet Scanner, http://www.iss.net/products_services/enterprise_protection/ vulnerability_assessment/scanner_internet.php.
[25] Stuart Staniford, Vern Paxson, and Nicholas Weaver, “How to 0wn the Internet in Your Spare Time”, Proceedings of the 11th USENIX Security Symposium, May 2002. (Available at http://www.icir.org/vern/papers/cdc-usenix-sec02/)
[26] Gregory R. Ganger, Greg g Economou and Stanley M. Bielski, “Self-Secure Network Interfaces: What, Why and How”, CMU-CS-02-144, School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213, May 2002.
[27] Matthew M. Williasmson, “Throttling Viruses: Restricting propagation to defeat malicious mobile code”, 18th Annual Computer Security Applications Conference, December 2002.
[28] Anil Somayaji and Stephanie Forrest, ”Automated Response Using System-Call Delays”, Proceedings of the 9th USENIX Security Symposium, August 2000.
[29] Guardian Project, http://www.chaotic.org/guardian/.
[30] CERT/CC, “CERT Advisory CA-2003-04 MS-SQL Server Worm”, January 2003.
[31] Microsoft Corporation, “PSS Security Response Team Alert – New Worm: W32.Slammer”, January 2003. (Available at http://www.microsoft.com/technet/ security/virus/alerts/slammer.asp )
[32] Cisco System Inc., “Using Network-Based Application Recognition and ACLs for Blocking the "Code Red" Worm”, September 2002.
[33] Cisco System Inc., “SAFE SQL Slammer Worm Attack Mitigation”, January 2002.
[34] Kerio Personal Firewall, http://www.kerio.com/us/kpf_home.html.
[35] Nmap, http://www.insecure.org/nmap/index.html, 2003.
[36] Snort: The Open Source Network Intrusion Detection System, http://www.snort.org/.
[37] S. Cheung, R.Crawford, and M. Dilger et al., “The Design of GrIDS: A Graph-Based Intrusion Detection System”, Technical Report CSE-99-2, U.C. Davis Computer Science Department, January 1999. (Available at http://seclab.cs.ucdavis.edu/arpa/grids/grids.ps)
[38] S. Staniford-Chen, S. Cheung, R. Crawford et al., “GrIDS: A graph based intrusion detection system for large networks”, In Proceedings of the 19th National Information Systems Security Conference, pages 361 ~ 370, 1996.
[39] Robert Gwaltney, “Protecting the Next Generation Network – Distributed Firewalls”, http://www.sans.org/rr/firewall/next_gen.php.
[40] Thomas Toth and Christopher Kruegel, “Connection-history based anomaly detection”, Proceedings of the 2002 IEEE Workshop on Information Assurance and Security, June 2002.
[41] CNET Networks, Inc., “Counting the cost of Slammer”, January 2003.
(Available at http://news.com.com/2100-1001-982955.html)
[42] High Level Firewall Language Projects, http://www.hlfl.org and http://freshmeat.net/projects/hlfl/.
[43] VulXML Project: A Web Application Security Vulnerability Description Language, http://www.owasp.org/vulnxml/, October 2002.
[44] OVAL, Open Vulnerability Assessment Language, http://oval.mitre.org/, October 2002.
[45] AVDL, Application Vulnerability Description Language, http://www.avdl.org/, April 2003. |