[1] |
Balthrop J, Forrest S, Newman M E J, et al. Technological networks and the spread of computer viruses[J]. Science, 2004, 304(5670):527529.
|
[2] |
Werlinger R,Muldner K,Hawkey K,et al.Preparation, detection, and analysis:The diagnostic work of IT security incident response [J]. Information Management & Computer Security, 2010, 18(1):2642.
|
[3] |
Papadogiannakis A, Vasiliadis G, Antoniades D, et al. Improving the performance of passive network monitoring applications with memory locality enhancements[J]. Computer Communications, 2012, 35(1):129140.
|
[4] |
Aguirre I, Alonso S. Improving the automation of security information management:A collaborative approach[J]. Security & Privacy, 2012, 10(1):5559.
|
[5] |
Aydin M A, Zaim A H K, Ceylan G A. Hybrid intrusion detection system design for computer network security [J]. Computers and Electrical Engineering, 2009, 35(3):517526.
|
[6] |
Manning W.Check point certified security administrator(Ccsa) certification exam preparation course in a book for passing the check point certified security administrator (Ccsa) exam:The how to pass on your first try certification study guide[M]. London:Emereo Pty Ltd, 2010.
|
[7] |
Zhang Ying, Deng Fachao, Chen Zhen. UTMCM:A practical control mechanism solution for UTM system[C]∥Proc of International Conference on Communications and Mobile Computing, 2010:8690.
|
[8] |
Myungkeun Y, Chen Shigang, Zhang Zhan. Minimizing the maximum firewall rule set in a network with multiple firewalls[J]. IEEE Transactions on Computers, 2010, 59(2):218230.
|
[9] |
Shahrestani S A.Employing artificial immunology and approximate reasoning models for enhanced network intrusion detection[J]. WSEAS Transactions on Information Science and Applications, 2009, 6(2):190200.
|
[10] |
Wang Baoyi, Yang Haipeng, Zhang Shaomin. Research on application of interaction Firewall with IDS in distribution automation system[C]∥Proc of 2011 International Conference on Electronic Engineering, Communication and Management, 2012:527532.
|
[11] |
Tan Wei. The research of firewall and IDS interaction architecture [D]. Wuhan:Wuhan University of Technology, 2010. (in Chinese)
|
[12] |
Vukobratovic D, Senk V. Transactions papers evaluation and design of irregular LDPC codes using ACE spectrum [J]. IEEE Transactions on Communications, 2009, 57(8):22722279.
|
[13] |
KhalilHani M, Nambiar V P, Marsono M N. Hardware acceleration of OpenSSL cryptographic functions for highperformance internet security [C]∥Proc of International Conference on Intelligent Systems, Modelling and Simulation, 2010:374379.
|
[14] |
Kurundkar G D,Naik N A, Khamitkar S D. Network intrusion detection using Snort[J]. International Journal of Engineering Research and Applications, 2012, 2(2):12881296.
|
[15] |
Rovniagin D, Wool A. The geometric efficient matching algorithm for firewalls [J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(1):147159.
|
[16] |
Chao C S, Yang S J H. A novel threetiered visualization approach for firewall rule validation[J]. Journal of Visual Languages & Computing, 2011, 22(6):401414.
|
[17] |
Shiravi A, Shiravi H, Tavallaee M, et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection [J]. Computers and Security, 2012, 31(3):357374.
|
[18] |
Salah K, Kahtani A. Performance evaluation comparison of Snort NIDS under Linux and Windows server [J]. Journal of Network and Computer Applications, 2010, 33(1):615.
|
|
附中文参考文献:
|
[11] |
谭伟. 防火墙与入侵检测系统联动架构的研究[D]. 武汉:武汉理工大学, 2010.
|