[1] Spitzner L. The honeynet project: trapping the hackers[J]. IEEE Security and Privacy, 2003, 1(2): 15-23.
[2] 诸葛建伟, 唐勇, 韩心慧, 等. 蜜罐技术研究与应用进展[J]. 软件学报, 2013, 24(4): 825-842. Zhuge Jianwei, Tang Yong, Han Xinhui, et al. Honeypot technology research and application[J]. Journal of Software, 2013, 24(4): 825-842.
[3] More Asit, Shashikala Tapaswi. A software router based predictive honeypot roaming scheme for network security and attack analysis[C]//Innovations in Information Technology (IIT), 2013 9th International Conference on. Abu Dhabi: IEEE, 2013: 221-226.
[4] McKeown N, Anderson T, Balakrishnan H, et al. Openflow: enabling innovation in campus networks[J]. ACM SIGCOMM Computer Communication Review, 2008, 38(2): 69-74.
[5] Portokalidis G, Bos H. SweetBait: zero-hour worm detection and containment using low-and high-interaction honeypots[J]. Computer Networks, 2007, 51(5): 1256-1274.
[6] Wang Yimin, Beck Doug, Jiang Xuxian, et al. Automated web patrol with strider honeymonkeys: finding web sites that exploit browser vulnerabilities[C]//Harder E. Proceedings of the 2006 Network and Distributed System Security Symposium. San Diego: the Internet Society, 2006: 35-49.
[7] Anagnostakis K G, Sidiroglou S, Akritidis P, et al. Detecting targeted attacks using shadow honeypots[C]//McDanie P. USENIX Security. Berkeley: USENIX Association, 2005: 9. |