[1]
|
S. Garfinkel, G. Spafford. “Practical UNIX and Internet Security (3rd Ed.),” O’Reilly Media, 2003.
|
[2]
|
U.S.G.A.O. “Continued Federal Efforts Are Needed to Protect Critical Systems and Information,” 2009.
|
[3]
|
S. Christey and R. Martin, “Common Weakness Enumeration. Vulnerability Type Distributions in CVE,” May 22, 2007. Internet Available: http://cwe.mitre.org/docume
nts/ vuln-trends/index.html
|
[4]
|
SANS Institute. “SANS Top-20 2007 Security Risks(2007 Annual Update)”, 2007. Internet Available: http://www.san
s.org/top20/2007/
|
[5]
|
J. Owens and J. Matthews, “A Study of Passwords and Methods Used in Brute-Force Ssh Attacks,” Technical Report, Department of Computer Science, Clarkson University, 2008.
|
[6]
|
S. William, “Stallings: Network Security Essentials:Applications and Standards 2/E”, Pearson, 2005.
|
[7]
|
Y. N. Su and Y. H. Chen, ”Block Online Password Guessing Attacks to a SSH Service with Analyzing System Log Files,” Journal of Computer Science and Application, Vol. 5, No. 2, December 2009, pp.108-122.
|
[8]
|
Y. J. Hsueh, “A Study of Using NetFlow Traffic Data to Detect and Track SSH Dictionary Attack,” Master Thesis, Department of Asia-Pacific Industrial and Business Management, National University of Kaohsiung, Taiwan, 2009.
|
[9]
|
Y. N. Su, Y. H. Chen, G. H. Chung and B. J. H. Wu, “Developing a SSH Dictionary Attack Defense System in the Multi Platform Environment through the Analyzing Log”. International Conference on Internet Technology and Applications, China, 2010.
doi:10.1109/ITAPP.2010.5566560
|
[10]
|
R. Corin, J. Doumen and S. Etalle, “Analysing Password Protocol Security Against Off-Line Dictionary Attacks,” Electronic Notes in Theoretical Computer Science, Vol. 121, No. 4, 2005, pp. 47-63.
doi:10.1016/j.entcs.2004.10.007
|
[11]
|
D. M. Tsai, “Bird’s Linux: Basic Learning”, GrandTech, 2003.
|
[12]
|
R. Wichmann, “Defending against Brute Force Ssh Attacks”, 2008. Internet Available: http://la-samhna.de/library/brutessh.html
|
[13]
|
S. Shit, “The SSH/FTP Brute Force Blocker,” 2010, Internet Available: http://anp.ath.cx/sshit/
|
[14]
|
V. Goyal, et al., “A New Protocol to Counter Online Dictionary Attacks,” Computers & Security, Vol. 25, No. 2, 2006, pp. 114-120. doi:10.1016/j.cose.2005.09.003
|