:::

詳目顯示

回上一頁
題名:主機型惡意程式收集器
書刊名:正修學報
作者:許博學
作者(外文):Hsu, Po-hsueh
出版日期:2012
卷期:25
頁次:頁91-102
主題關鍵詞:惡意程式惡意程式收集器蜜罐入侵偵測系統MalwareMalware collectorHoneypotIntrusion detection system
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:2
  • 點閱點閱:21
期刊論文
1.Raynal, F.、Berthier, Y.、Biondi, P.、Kaminsky, D.(2004)。Honeypot forensics part II: analyzing the compromised host。IEEE Security & Privacy Magazine,2(5),77-80。  new window
2.黃培生、楊中皇(20091200)。結合入侵偵測和蜜罐之分散式預警系統的設計與實現。資訊、科技與社會學報,16,83-97。new window  延伸查詢new window
3.Artaila, H.、Safab, H.、Sraja, M.、Kuwatlya, I.、Al-Masria, Z.(2006)。A hybrid Honeypot framework for improving intrusion detection systems in protecting organizational networks。Computers & Security,25(4),274-288。  new window
4.Chuvakin, A.(2003)。Honeynets: High Value Security Data。Network Security,2003(8),11-15。  new window
5.Raynal, F.、Berthier, Y.、Biondi, P.、Kaminsky, D.(2004)。Honeypot Forensics, Part I: Analyzing the Network。IEEE Security & Privacy,2,72-78。  new window
6.Krawetz, N.(2004)。Anti-honeypot technology。IEEE Security & Privacy,2(1),76-79。  new window
7.袁海新、陳家琪(2008)。基於系統合網路特徵的蜜罐識別技術。計算機工程與設計,29(7)。  延伸查詢new window
8.程曉偉、楊百龍(2009)。基于蜜罐特徵的蜜罐識別技術。現代電子技術,15,89-92。  延伸查詢new window
9.孫彥東、李東(2006)。疆屍網路綜述。中國計算機應用,26(7),1628-1633。  延伸查詢new window
10.Wang, P.、Wu, L.、Cunningham, R.、Zou, C.(2010)。Honeypot detection in advanced botnet attacks。Int. J. Information and Computer Security,4(1),30-51。  new window
11.Inoue, D.、Yoshioka, K.、Eto, M.、Hoshizawa, Y.、Nakao, K.(2009)。Automated Malware Analysis System and its Sandbox for Revealing Malware's Internal and External Activities。IEICE Transactions on Information and Systems,E92-D (5),945-954。  new window
12.許博學(2009)。設計一個適用一般人的主機入侵防禦系統。正修學報,22,197-209。new window  延伸查詢new window
會議論文
1.Barford, P.、Yegneswaran, V.(2006)。An Inside Look at Botnets。Special Workshop on Malware Detection, Advances in Information Security,171-191。  new window
2.Zhang, F.、Zhou, S.、Qin, Z.、Liu, J.(2003)。Honeypot: a Supplemented Active Defense System for Network Security231-235。  new window
3.Provos, N.(2004)。A virtual honeypot framework。  new window
4.Tang, Y.、Chen, S.(2005)。Defending against internet worms: a signature-based approach。Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies,(會議日期: 13-15 March)。  new window
5.Anagnostakis, K.、Sidiroglou, S.、Akritidis, P.、Xinidis, K.、Markatos, E.、Keromytis, A.(2005)。Detecting targeted attacks using shadow honeypots。  new window
6.McGrew, R.(2006)。Experiences with Honeypot Systems: Development, Deployment, and Analysis。Proceedings of the 39th Annual Hawaii International Conference。  new window
7.Huang, P. S.、Yang, C. H.、Ahn, T. N.(2009)。Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot。ICHIT '09, Int. Conference on Hybrid Information Technology。  new window
8.Lin, C. H.、Yang, C. H.、Chen, S. J.、Wu, J. S.(2010)。An Implementation of a Maiware Collection and Data Sharing System Based on Honeypot。The 5th Joint Workshop on Information Security (JWIS),82-96。  new window
9.林志鴻、楊中皇(2011)。用於網路鑑識分析之惡意程式搜集系統設計與實作。第二十一屆資訊安全會議,191-198。  延伸查詢new window
10.Dornseif, M.、Holz T.、Klein, C.(2004)。NoSEBrEaK--Attacking Honeynets。  new window
11.Dagon, D.、Zou, C.、Lee, W.(2006)。Modeling botnet propagation using time zones235-249。  new window
其他
1.Spitzner, L.(2003)。Honeypots: Simple, Cost-Effective Detection,http://www.symantec.com/connect/articles/honeypots-simple-cost-effective-detection。  new window
2.Spitzner, L.(2003)。Honeypot Farms,http://www.symantec.com/connect/articles/honeypot-farms。  new window
3.Honeynet Project(2003)。Know Your Enemy : Sebek,https://projects.honeynet.org/sebek/。  new window
4.Honeynet Project(2005)。Know your enemy: GenII Honeynets,http://old.honeynet.org/papers/gen2/。  new window
5.Snort(2006)。Snort users manual,http://www.snort.org/assets/l66/snort_manual.pdf.。  new window
6.Seifried, K.(2002)。Honeypotting with VMware basics,http://www.seifried.org/security/ids/20020101-honeypot-vmware-basics.html。  new window
7.Holz T.(2004)。Anti-Honeypot Technology,http://events.ccc.de/Congress/2004/fahrplan/files/208-anti-honeypot-technology-slides.pdf。  new window
8.Dornseif, M.(2005)。Anti-Honeypot Technology,http://pi1.informatik.uni-rnannheim.de/filepool/presentations/anti-honeypot-technology.pdf。  new window
9.Oudot, L.,Holz T.(2004)。Defeating Honeypots : Network issues, Part1,http://www.symantec.com/connect/articles/defeating-honeypots-network-issues-part-1。  new window
10.Oudot, L.,Holz T.(2004)。Defeating Honeypots : Network issues, Part2,http://www.synantec.com/connect/articles/defeating-honeypots-network-issues-part-2。  new window
11.Xinwen, F.,Wei, Y.,Cheng, D.,Xuejun. T.,Streff, K.,Graham, S.(2006)。On Recognizing Virtual Honeypots and Countermeasures。  new window
12.Mukkamala, S.,Yendrapalli, K.,Basnet, R.,Shankarapani, M.,Sung, A. H.(2007)。Detection of Virtual Environments and Low Interaction Honeypots。  new window
13.Holz, T.,Raynal, F.(2005)。Detecting Honeypots and Other Suspicious Environments。  new window
14.Bächer, P.,Holz, T.,Kötter, M.,Wicherski, G.(2008)。Know your enemy: tracking botnets,http://www.honeynet.org/papers/bots.。  new window
15.Lenny。Malware Sample Sources for Researchers,http://zeltser.com/combating-malicious-software/malware-sample-sources.html。  new window
16.許博學,http://teacherweb.csie.csu.edu.tw/0133/WMIPub_V1.3.zip。  new window
圖書論文
1.Baecher, P.、Koetter, M.、Holz, T.、Dornseif, M.、Freiling, F.(2006)。The Nepenthes Platform: An Efficient Approach to Collect Malware。RAID 2006, LNCS, vol. 4219, Springer, Heidelberg。  new window
2.賴明豐(2007)。蜜罐技術的分析與應用。資通安全分析專論。國家實驗研究院科技政策研究與資訊中心。  延伸查詢new window
3.Shiue, L. M.、Kao, S. J.(2008)。Countermeasure for Detection of Honeypot Deployment。Computer and Communication Eng.。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE