9. Foydalanilgan adabiyotlar
:
Alata E. & Nicomette V. & Kaâniche M. & Dacier M. & Herrb M.,2006.Lessons
learned from the deployment of
a high-interaction honeypot,
EDCC'06.
Baecher P. & Koetter M. & Holz T. & Dornseif M. & Freiling F.,2006.The
Nepenthes Platform: An Efficient Approach to Collect Malware.
Barel M., 2004. Honeypot : un pot-pourri…juridique,
Actes du symposium
SSTIC04.
Bishop M. & Frincke D.A.,2006.Computer
Security Education and
Research Handle with Care ,
IEEE Computer Society.
Crandall J.R. &Wu S.F & Chong F.T., Experiences Using Minos as a Tool
for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities
University of California, Davis University
of
California,
Santa
Barbara
[Online]
Available at
:
http://www.cs.unm.edu/~crandall/DIMVAMinos.ppt [Accessed 3 May 2010]
Glasvezel Networks Nederland Fiber to the Home Project (FTTH) 2009.
Honeypot Software Honeypot Products Deception Software [Online] (Updated 23
October 2009) Available at : http://www.honeypots.net/honeypots/products
[Accessed 5 May 2010].
Kipper G.,2007.
Wireless Crime and Forensic Investigation.USA:Auerbach
Publications,Taylor & Francis Group.
Lakhani A.D., A dissertation on deception techniques using
honeypots.Information
Security Group Royal Holloway, University of
London,UK.
Maggi
F.
&
Zanero
S.,2008.ICT-216026-WOMBAT
Worldwide
Observatory of Malicious Behaviors and Attack Threats,Analysis of the state-of-
the-art.
Maheswari V. & Sankaranarayanan Dr.P.E. 2007.Honeypots:
Deployment and
Data Forensic Analysis International Conference on
Computational Intelligence and Multimedia Applications 2007.
McFarland B.,2005. Ethical Deception and Preemptive Deterrence in
Network Security GCFW Practical Version 4.1 ,
SANS Institute 2000-
2005.
Mokube,I. & Adams M.,2007.Honeypots:Concepts,Approaches,and
Challenges.
ACMSE 2007, March 23-24, 2007, Winston-Salem, North
Carolina, USA ,pp.321-325.
Phillipe JM. 6 mois de capture de logiciels malveillants
[Online](Updated
24
july
2007).
Available
at
:
http://philipjm.free.fr/blog/index.php?2007/07/24/113-6-mois-de-
capture-de- logiciels-malveillants/ [Accessed 2 May 2010].
Portokalidis G.,2008. Argos An emulator
for capturing zero-day
attacks
[Online]
(Updated
16
April
2009
)
Available
at
:
http://www.few.vu.nl/Argos/ [Accessed 2 May 2010].
Portokalidis G. & Slowinska A. & Bos H.,2006. Argos: an Emulator
for Fingerprint