參考文獻 |
[游啟勝 2003] 游啟勝,「合作式防火牆之設計與應用」,國立中央大學資訊管理學系碩士論文,民國 92 年 6 月。
[曾宇瑞 2000] 曾宇瑞,「網路安全縱深防禦機制之研究」,國立中央大學資訊管理學系碩士論文,民國 89 年 6 月。
[Bridge 2001] Steve Bridge, “Achieving Defense-in-Depth with Internal Firewalls”, August 2001. (Available at http://www.sans.org/rr/paper.php?id=797)
[CBS 2003] S. Coull, J. Branch, B. Szymanski, “Intrusion detection: A Bioinformatics Approach”, In 19th Annual Computer Security Applications Conference, Las Vegas , 2003
[CERT] CERT/CC, “Overview of Attack Trends”, Software Engineering Institute, Carnegie Mellon University, 2002.
(Available at http://www.cert.org/archive/pdf/attack_trends.pdf)
[dbench] dbench – Emulating Netbench,
http://samba.org/ftp/tridge/dbench/README
[ELS 2001] E. Eskin, W. Lee, and S. J. Stolfo. “Modeling system calls for intrusion detection with dynamic window size”, In Proceedings of DARPA Infor-
mation Survivability Conference & Exposition II, 2001(DISCEX '01), pages 165-175, Anaheim, CA, June 2001.
[FHSL 1996] S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. , “A sense of self for unix processes”, In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 120-128, Los Alamitos, CA, 1996. IEEE Computer Society Press.
[FKFLG 2003] H. H. Feng, O. M. Kolesnikov, P. Fogla, W. Lee, and W. Gong. “Anomaly detection using call stack information”, In Proceedings of the 2003 IEEE Symposium on Security and Privacy. Pages 62-75, Berkley, CA, 2003. IEEE Computer Society Press.
[Graf 2003] Tal Garfinkel. “Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools”, In Proceedings of the ISOC Symposium on Network and Distributed System Security, 2003.
[HB 1997] P. Helman and J. Bhangoo. “A statistically based system for prioritizing information exploration under uncertainty”, IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 27(4):449-466, July 1997.
[HF 2000] S. A. Hofmeyr, S.Forrest, “Intrusion detection using sequences of system calls”, (http://www.cs.virginia.edu/~jones/cs851sig/slides/forrest-signature.ppt)
[HFS 1998] S. A. Hofmeyr, S. Forrest, and A. Somayaji. , “Intrusion detection using sequences of system calls”, Journal of Computer Security, Volume 6, pages 151-180, 1998.
[Janus] T. Garfinkel and D. Wagner. Janus: A practical tool for application sandboxing. http://www.cs.berkeley.edu/~daw/janus
[KHHTM 2001] A. Krings, W. Harrison, N. Hannebutte, C. Taylor and M. McQueen, “Attack Recognition Based on Kernel Attack Signatures”, In Proceedings of 2001 International Symposium. on Information Systems and Eng., (ISE’2001), Las Vegas, June 25-28, 2001.
[Kumar 1995] S. Kumar. “Classification and Detection of Computer Intrusions”, PhD thesis, Department of Computer Sciences, Purdue University, August 1995.
[LS 1998] W. Lee and S. J. Stolfo. Data mining approaches for intrusion detection. In Proceedings of the 7th USENIX Security Symposium, 1998.
[LSC 1997] W. Lee, S. J. Stolfo, and P. K. Chan. Learning patterns from UNIX process execution traces for intrusion detection. In AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, pages 50–56. AAAI Press, July 1997.
[LV 2002] Y. Liao, V. R. Vemuri, “Using Text Categorization Techniques for Intrusion Detection”, 11th USENIX Security Symposium, 2002
[Openwall] Linux kernel patch from the Openwall Project,
http://www.openwall.com/linux
[Padala 2002] P. Padala, “Playing with ptrace, Part I”, November 2002.
(Available at http://www.linuxjournal.com/article.php?sid=6100)
[Padala 2002a] P. Padala, “Playing with ptrace, Part II”, December 2002.
(Available at http://www.linuxjournal.com/article.php?sid=6210)
[PC 2002] H. J. Park and S. B. Cho, “Privilege flows modeling for effective intrusion detection based on HMM”, Department of Computer Science, Yonsei University, Korea, 2002.
[Provos 2003] Niels Provos, “Improving Host Security with System call Policies”, 12th USENIX Security Symposium, 2003.
[RG 2003] M. Roesch and C. Green, “Snort Users Manual”,
http://www.snort.org/docs/writing_rules/chap2.html#tth_sEc2.3.22, 2003.
[Symantec] Symantec Internet Security Threat Report Volume V, https://enterprisesecurity.symantec.com/Content/displaypdf.cfm?SSL=YES&EID=0&PDFID=665&promocode=ITR
[Systrace] Systrace – Interactive Policy Generation for System calls,
http://niels.xtdnet.nl/systrace/
[SZ 2002] K. Sequeira and M. Zaki, “ADMIT: Anomaly-based data mining for intrusions”, SIGKDD 02 Edmonton, Alberta, Canada, 2002.
[WD 2001] D. Wagner and D. Dean, “Intrusion detection via static analysis”, In Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 156-168, Oakland, California, 2001.
[WDD 2000] A. Wespi, M. Dacier, and H. Debar. “Intrusion detection using variable-length audit trail patterns”, In Proceedings of the 3rd symposium on Recent Advances in Intrusion Detection (RAID 2000), pages 110-129, Toulouse, France, October 2000.
[WFP 1999] C. Warrender, S. Forrest, B. Pearlmutter, “Detecting intrusions using system calls: alternative data models”, In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 133-152, Oakland, California, 1999.
[WS 2002] D. Wagner and P. Soto. Mimicry attacks on host based intrusion detection systems. In Proc. Ninth ACM Conference on Computer and Communications Security, 2002. |