| 期刊論文1. | Raynal, F.、Berthier, Y.、Biondi, P.、Kaminsky, D.(2004)。Honeypot forensics part II: analyzing the compromised host。IEEE Security & Privacy Magazine,2(5),77-80。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | 黃培生、楊中皇(20091200)。結合入侵偵測和蜜罐之分散式預警系統的設計與實現。資訊、科技與社會學報,16,83-97。 延伸查詢![new window](/gs32/images/newin.png) | 3. | Artaila, H.、Safab, H.、Sraja, M.、Kuwatlya, I.、Al-Masria, Z.(2006)。A hybrid Honeypot framework for improving intrusion detection systems in protecting organizational networks。Computers & Security,25(4),274-288。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Chuvakin, A.(2003)。Honeynets: High Value Security Data。Network Security,2003(8),11-15。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Raynal, F.、Berthier, Y.、Biondi, P.、Kaminsky, D.(2004)。Honeypot Forensics, Part I: Analyzing the Network。IEEE Security & Privacy,2,72-78。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Krawetz, N.(2004)。Anti-honeypot technology。IEEE Security & Privacy,2(1),76-79。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | 袁海新、陳家琪(2008)。基於系統合網路特徵的蜜罐識別技術。計算機工程與設計,29(7)。 延伸查詢![new window](/gs32/images/newin.png) | 8. | 程曉偉、楊百龍(2009)。基于蜜罐特徵的蜜罐識別技術。現代電子技術,15,89-92。 延伸查詢![new window](/gs32/images/newin.png) | 9. | 孫彥東、李東(2006)。疆屍網路綜述。中國計算機應用,26(7),1628-1633。 延伸查詢![new window](/gs32/images/newin.png) | 10. | Wang, P.、Wu, L.、Cunningham, R.、Zou, C.(2010)。Honeypot detection in advanced botnet attacks。Int. J. Information and Computer Security,4(1),30-51。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 11. | Inoue, D.、Yoshioka, K.、Eto, M.、Hoshizawa, Y.、Nakao, K.(2009)。Automated Malware Analysis System and its Sandbox for Revealing Malware's Internal and External Activities。IEICE Transactions on Information and Systems,E92-D (5),945-954。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 12. | 許博學(2009)。設計一個適用一般人的主機入侵防禦系統。正修學報,22,197-209。 延伸查詢![new window](/gs32/images/newin.png) | 會議論文1. | Barford, P.、Yegneswaran, V.(2006)。An Inside Look at Botnets。Special Workshop on Malware Detection, Advances in Information Security,171-191。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Zhang, F.、Zhou, S.、Qin, Z.、Liu, J.(2003)。Honeypot: a Supplemented Active Defense System for Network Security231-235。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Provos, N.(2004)。A virtual honeypot framework。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Tang, Y.、Chen, S.(2005)。Defending against internet worms: a signature-based approach。Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies,(會議日期: 13-15 March)。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Anagnostakis, K.、Sidiroglou, S.、Akritidis, P.、Xinidis, K.、Markatos, E.、Keromytis, A.(2005)。Detecting targeted attacks using shadow honeypots。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | McGrew, R.(2006)。Experiences with Honeypot Systems: Development, Deployment, and Analysis。Proceedings of the 39th Annual Hawaii International Conference。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | Huang, P. S.、Yang, C. H.、Ahn, T. N.(2009)。Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot。ICHIT '09, Int. Conference on Hybrid Information Technology。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 8. | Lin, C. H.、Yang, C. H.、Chen, S. J.、Wu, J. S.(2010)。An Implementation of a Maiware Collection and Data Sharing System Based on Honeypot。The 5th Joint Workshop on Information Security (JWIS),82-96。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 9. | 林志鴻、楊中皇(2011)。用於網路鑑識分析之惡意程式搜集系統設計與實作。第二十一屆資訊安全會議,191-198。 延伸查詢![new window](/gs32/images/newin.png) | 10. | Dornseif, M.、Holz T.、Klein, C.(2004)。NoSEBrEaK--Attacking Honeynets。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 11. | Dagon, D.、Zou, C.、Lee, W.(2006)。Modeling botnet propagation using time zones235-249。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 其他1. | Spitzner, L.(2003)。Honeypots: Simple, Cost-Effective Detection,http://www.symantec.com/connect/articles/honeypots-simple-cost-effective-detection。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Spitzner, L.(2003)。Honeypot Farms,http://www.symantec.com/connect/articles/honeypot-farms。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Honeynet Project(2003)。Know Your Enemy : Sebek,https://projects.honeynet.org/sebek/。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Honeynet Project(2005)。Know your enemy: GenII Honeynets,http://old.honeynet.org/papers/gen2/。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Snort(2006)。Snort users manual,http://www.snort.org/assets/l66/snort_manual.pdf.。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Seifried, K.(2002)。Honeypotting with VMware basics,http://www.seifried.org/security/ids/20020101-honeypot-vmware-basics.html。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | Holz T.(2004)。Anti-Honeypot Technology,http://events.ccc.de/Congress/2004/fahrplan/files/208-anti-honeypot-technology-slides.pdf。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 8. | Dornseif, M.(2005)。Anti-Honeypot Technology,http://pi1.informatik.uni-rnannheim.de/filepool/presentations/anti-honeypot-technology.pdf。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 9. | Oudot, L.,Holz T.(2004)。Defeating Honeypots : Network issues, Part1,http://www.symantec.com/connect/articles/defeating-honeypots-network-issues-part-1。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 10. | Oudot, L.,Holz T.(2004)。Defeating Honeypots : Network issues, Part2,http://www.synantec.com/connect/articles/defeating-honeypots-network-issues-part-2。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 11. | Xinwen, F.,Wei, Y.,Cheng, D.,Xuejun. T.,Streff, K.,Graham, S.(2006)。On Recognizing Virtual Honeypots and Countermeasures。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 12. | Mukkamala, S.,Yendrapalli, K.,Basnet, R.,Shankarapani, M.,Sung, A. H.(2007)。Detection of Virtual Environments and Low Interaction Honeypots。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 13. | Holz, T.,Raynal, F.(2005)。Detecting Honeypots and Other Suspicious Environments。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 14. | Bächer, P.,Holz, T.,Kötter, M.,Wicherski, G.(2008)。Know your enemy: tracking botnets,http://www.honeynet.org/papers/bots.。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 15. | Lenny。Malware Sample Sources for Researchers,http://zeltser.com/combating-malicious-software/malware-sample-sources.html。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 16. | 許博學,http://teacherweb.csie.csu.edu.tw/0133/WMIPub_V1.3.zip。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 圖書論文1. | Baecher, P.、Koetter, M.、Holz, T.、Dornseif, M.、Freiling, F.(2006)。The Nepenthes Platform: An Efficient Approach to Collect Malware。RAID 2006, LNCS, vol. 4219, Springer, Heidelberg。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | 賴明豐(2007)。蜜罐技術的分析與應用。資通安全分析專論。國家實驗研究院科技政策研究與資訊中心。 延伸查詢![new window](/gs32/images/newin.png) | 3. | Shiue, L. M.、Kao, S. J.(2008)。Countermeasure for Detection of Honeypot Deployment。Computer and Communication Eng.。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | |