[1] JUELS A, RISTENPART T. Honey encryption:security beyond the brute-force bound[C]//Proceedings of the 2014 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 8441. Berlin:Springer, 2014:293-310. [2] OWEZARSKI P. A near real-time algorithm for autonomous identification and characterization of honeypot attacks[C]//Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. Berlin:Springer, 2015:531-542. [3] JUELS A, RIVEST R L. Honeywords:making password-cracking detectable[C]//CCS 2013:Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. New York:ACM, 2013:145-160. [4] TYAGI N, WANG J, WEN K, et al. Honey encryption applications[EB/OL].[2017-04-16]. https://courses.csail.mit.edu/6.857/2016/files/tyagi-wang-wen-zuo.pdf. [5] SPITZNER L. Honeytokens:the other honeypot[J]. Network Security, 2003, 12(2):12-14. [6] KIM I S, KIM M H. Agent-based honeynet framework for protecting servers in campus networks[J]. IET Information Security, 2012, 6(3):202-211. [7] JAIN P, SARDANA A. Defending against internet worms using honeyfarm[C]//Proceedings of the 2010 CUBE International Information Technology Conference. New York:ACM, 2012:795-800. [8] 王力,万园春,邱卫东.基于蜜罐的Android恶意代码动态分析[J].微型电脑应用,2016,32(11):50-53.(WANG L, WAN Y C, QIU W D. Dynamic analysis of Android malware based on honeypot[J]. Microcomputer Applications, 2016, 32(11):50-53.) [9] 陈翠云,梁华庆.基于蜜罐提升Snort检测能力的设计[J].电子设计工程,2016,24(4):48-51.(CHEN C Y, LIANG H Q. Design on enhancement of Snort detection capabilities based on honeypot technology[J]. Electronic Design Engineering, 2016, 24(4):48-51.) [10] 郭军权,诸葛建伟,孙东红,等.Spampot:基于分布式蜜罐的垃圾邮件捕获系统[J].计算机研究与发展,2014,51(5):1071-1080.(GUO J Q, ZHUGE J W, SUN D H, et al. Spampot:a spam capture system based on distributed honeypots[J]. Journal of Computer Research and Development, 2014, 51(5):1071-1080.) [11] BELLARE M, RISTENPART T, ROGAWAY P, et al. Format-preserving encryption[C]//Proceedings of the 2009 International Workshop on Selected Areas in Cryptography, LNCS 5867. Berlin:Springer, 2009:295-312. [12] DYER K P, COULL S E, RISTENPART T, et al. Protocol misidentification made easy with formattransforming encryption[C]//CCS 2013:Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. New York:ACM, 2013:61-72. [13] VINAYAK P P, NAHALA M A. Avoiding brute force attack in MANET using honey encryption[J]. International Journal of Science and Research, 2015, 4(3):83-85. [14] HUANG Z C, AYDAY E, FELLAY J, et al. GenoGuard:protecting genomic data against brute-force attacks[C]//Proceedings of the 2015 IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE, 2015:447-462. [15] YOON J W, KIM H, JO H J, et al. Visual honey encryption:application to steganography[C]//Proceedings of the 20153rd ACM Workshop on Information Hiding and Multimedia Security. New York:ACM, 2015:65-74. |