[1]
CNCERT/CC. 2007 [DB/OL]. http: /www. cert. org. cn/articles /docs/ network security work report of common/ 2007 082123431. shtml. 2008-02-10.
Google Scholar
[2]
Anderson J P. Computer Security Threat Monitoring and Surveillance[R]. James P Anderson Co, Fort Washington, Pennsylvania, (1980).
Google Scholar
[3]
CNNIC. twenty-first China Internet development statistical report [DB/OL]. http: /tech. qq. com/zt /2008/cnnic21. 2008-02-18.
Google Scholar
[4]
S Staniford, V Paxson, N Weaver. How to own the Internet in Your Spare Time. In: Proc. of the 11th USENIX Security Symposium. CA: USENIX Association Berkeley Publisher, 2002, 149-167.
Google Scholar
[5]
YEGNESWARAN V, GIFFIN J T, BARFORD P, et al. An architec-ture for generating semantics-aware signatures[A]. Proceedings of the14th USENIX Security Symposium[C]. Baltimore, MD, USA, 2005. 97-112.
DOI: 10.21236/ada449063
Google Scholar
[6]
NEWSOME J, KARP B, SONG D. Polygraph: automatically generat-ing signatures for polymorphic worms[A]. Proceedings of IEEE Sym-posium on Security and Privacy[C]. Washington, DC, USA, IEEEComputer Society, 2005. 226-241.
DOI: 10.1109/sp.2005.15
Google Scholar
[7]
Kreibich C,Crowcroft J.Honeycomb creating intrusion detection signatures using honeypot.In: Proc. of the 2nd Workshop on Hot Topics in Networks,Boston: HotNets-II, 2003, 51-56.
Google Scholar
[8]
Hyang-Ah Kim, Brad Karp. Autograph: Toward automated, distributed worm signature detection. In: Proc. of the 13th USENIX Security Symposium. San Diego: USENIX Press, 2004, 271-286.
Google Scholar
[9]
Piotr Kijewski. Automated Extraction of Threat Signatures from Network Flows. In: Proc. of the 18th Annual FIRST Conference. Baltimore: CERT, 2006, 261–271.
Google Scholar
[10]
Urjita Thakar. Honey analyzer - analysis and extraction of intrusion detection patterns & signatures using honeypot.In: Proc. of the 2nd International Conference on Innovations in Information Technology. Shri GS: Institute of Technology and Science, 2005, 88-104.
Google Scholar
[11]
Singh S, Estan C, Varghese G, Savage S. Automated worm fingerprinting. In: Proc. of the 6th Symposium on Operating Systems Design and Implementation. San Francisco: USENIX Association , 2004, 45-60.
Google Scholar