参考文献
|
-
TrendMicro, Threat Encyclopedia, Dec 27 2010, retrieved from http://about-threats.trendmicro.com/ArchiveMalware.aspx?language=us&name=TROJ_MDROPPER.ZY.
-
websense, “Advanced Persistent Threats and Other Advanced Attacks,”http://www.websense.com/content/advanced-attacks-in-the-news.aspx (2013/9/9).
-
G. Hoglund, “Advanced Persistent Threat,”http://www.issa-sac.org/info_resources/ISSA_20100219_HBGary_Advanced_Persistent_Threat.pdf (2013/9/9).
-
M.K. Daly, “The Advanced Persistent Threat,”http://static.usenix.org/event/lisa09/tech/slides/daly.pdf (2013/9/9).
-
K. Zetter, “Google hack attack was ultra sophisticated, new details show,”http://www.wired.com/threatlevel/2010/01/operation-aurora/ (2013/9/9).
-
Splunk, “Splunk: The IT search company,” http://www.splunk.com/ (2013/9/9)
-
Symantec, “Security Response”, http://www.symantec.com/ security_response/(2013/9/9).
-
C. Raiu, I. Soumenkov, K. Baumgartner and V. Kamluk, The MiniDuke Mystery: PDF 0-day Government Spy Assembler 0x29A Micro Backdoor, http://www.securelist.com/en/downloads/vlpdfs/themysteryofthepdf0-dayassemblermicrobackdoor.pdf
-
F. Li and A. Atlasis, “A Detailed Analysis of an Advanced Persistent Threat Malware,” http://www.sans.org/reading_room/whitepapers/malicious/detailed-analysis-advanced-persistent-threat-malware_33814 (2013/9/9).
-
Damballa, “Advanced Persistent Threats (APT),”http://www.damballa.com/knowledge/advanced-persistent-threats.php (2013/9/9).
-
D. Pogue, “Google Takes on Your Desktop,”http://www.nytimes.com/2004/10/21/technology/circuits/21stat.html (2013/9/9).
-
Sophos, “SOPHOS”, http://www.sophos.com/ (2013/9/9).
-
Alperovitch, D..Revealed: operation shady RAT.
-
Aquilina, J.M.,Casey, E.,Malin, C.H.(2008).Malware forensics: investigating and analyzing malicious code.Syngress Publishing.
-
Baize, E.(2012).Developing Secure Products in the Age of Advanced Persistent Threats.IEEE Security & Privacy,10,88-92.
-
Dempsey, K.L.,Chawla, N.S.,Johnson, L.A.,Johnston, R.,Jones, A.C.,Orebaugh, A.D.,Scholl, M.A.,Stine, K.M.(2011).Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations.National Institute of Standards and Technology U.S. Department of Commerce.
-
Goebel, J.,Holz, T.(2007).Rishi: identify bot contaminated hosts by IRC nickname evaluation.Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
-
Gordon, T.(2011).APTs: a poorly understood challenge.Network Security,2011,9-11.
-
Grow, B.,Epstein, K.,Tschang, C.C.(2008).The New E-spionage Threat.Bloomberg Businessweek Magazine,2008(April 09)
-
Gu, G.,Zhang, J.,Lee, W.(2008).BotSniffer: Detecting botnet command and control channels in network traffic.Proceedings of the 15th Annual Network and Distributed System Security Symposium
-
Juels, A.,Yen, T.F.(2012).Sherlock Holmes and The Case of the Advanced Persistent Threat.Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
-
Larson, R.E.(2003).CCSP: Cisco Certified Security Professional Certification All-in-One Exam Guide.McGraw Hill.
-
Leung, A.W.,Shao, M.,Bisson, T.,Pasupathy, S.,Miller, E.L.(2009).Spyglass: Fast, scalable metadata search for large-scale storage systems.Proccedings of the 7th conference on File and storage technologies
-
Li, F.,Lai, A.,Ddl, D.(2011).Evidence of Advanced Persistent Threat: A case study of malware for political espionage.6th International Conference on Malicious and Unwanted Software
-
Liu, S.T.,Chen, Y.M.(2010).Retrospective Detection of Malware Attacks by Cloud Computing.2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
-
Liu, S.T.,Chen, Y.M.,Hung, H.C.(2012).N-Victims: An Approach to Determine N-Victims for APT Investigations.Lecture Notes in Computer Science,7690,226-240.
-
Oberheide, J.,Cooke, E.,Jahanian, F.(2008).Cloudav: N-version antivirus in the network cloud.Proceedings of the 17th conference on Security symposium
-
Perdisci, R.,Lee, W.,Feamster, N.(2010).Behavioral clustering of HTTP-based malware and signature generation using malicious network traces.Proceedings of the 7th USENIX conference on Networked systems design and implementation
-
Pipkin, D.L.(2000).Information Security: Protecting the Global Enterprise.Prentice Hall PTR.
-
Rieck, K.,Schwenk, G.,Limmer, T.,Holz, T.,Laskov, P.(2010).Botzilla: detecting the "phoning home" of malicious software.Proceedings of the 2010 ACM Symposium on Applied Computing
-
Shah, S.,Soules, C.A.N.,Ganger, G.R.,Noble, B.D.(2007).Using provenance to aid in personal file search.2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
-
Sood, A.K.,Bansal, R.,Enbody, R.J.(2013).Cybercrime : Dissecting the State of Underground Enterprise.IEEE Internet Computing,17,60-68.
-
Sood, A.K.,Enbody, R.J.(2013).Targeted Cyber Attacks - A Superset of Advanced Persistent Threats.IEEE Security & Privacy,11,54-61.
-
Soules, C.A.N.,Ganger, G.R.(2005).Connections: using context to enhance file search.ACM SIGOPS Operating Systems Review,39,119-132.
-
Tan, J.,Pan, X.,Kavulya, S.,Gandhi, R.,Narasimhan, P.(2008).SALSA: analyzing logs as state machines.Proceedings of the First USENIX conference on Analysis of system logs
-
Tankard, C.(2011).Advanced Persistent threats and how to monitor and deter them.Network Security,2011,16-19.
-
Thonnard, O.,Bilge, L.,O'Gorman, G.,Kiernan, S.,Lee, M.(2012).Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat Research in Attacks, Intrusions, and Defenses.Lecture Notes in Computer Science,7462,64-85.
-
Warmer, M.(2011).University of TWENTE.
-
Winder, D.(2011).Persistent and Evasive Attacks Uncovered.Infosecurity,8,40-43.
-
Zhu, Z.,Lu, G.,Chen, Y.,Fu, Z.,Roberts, P.,Han, K.(2008).Botnet Research Survey.32nd Annual IEEE International Computer Software and Applications,Evanston, I.L.:
|