[1]VAN DOORN L. Computer Break-ins: A Case Study [A]. NLUUG proceedings [C], 1992.
[2]BOULANGER A. Catapults andgrappling hooks: The tools and techniques of information warfare [J/OL]. IBM Systems Journal, 1998, 37(1).
[3]Common Vulnerabilities and Exposures [EB/OL]. http://cve.mitre.org, 2003-08.
[4]王晓程, 刘恩德, 谢小权. 攻击分类研究与分布式网络入侵检测系统 [J]. 计算机研究与发展, 2001, 38(6): 727-734.
[5]SCHNEIER B. Attack Trees: Modeling Security Threats [J]. Dr. Dobb 's Journal, 1999, 12(24): 21-29.
[6]MOORE AP, ELLISON RJ, LINGER RC. Attack modeling for information security and survivability [R]. CMU/SEI-2001-TN-001, 2001.
[7]TIDWELL T, LARSON R, FITCH K, et al. Modeling Internet Attacks [A]. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security [C], 2001. 54-59.
[8]HUANG M-Y, WICKS TM. A Large-scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis [A]. Proceedings of the First International Workshop on Recent Advances in Intrusion Detection [C], 1998.
[9]MCDERMOTT J. Attack Net Penetration Testing [A]. The 2000 New Security Paradigms Workshop [C], 2000. 5-22.
[10]STEFFAN J, SCHUMACHER M. Collaborative attack modeling [A]. Proceedings of SAC [C], 2002.
[11]ILGUN K, KEMMERER A, PORRAS P. State Transition Analysis: A Rule-Based Intrusion Detection Approach [J]. IEEE Transactions on Software Engineering, 1995, 21(3): 181-199.
[12]BACE R. MELL P. Intrusion Detection Systems [A]. NIST Special Publication on Intrusion Detection Systems [C], 2001.
|