[1]
|
CSI/FBI, “Computer Crime and Security Survey,” 2004.
http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2004.pdf
|
[2]
|
C. Baumrucker, J. Burton, S. Dentler, et al., “Cisco Security Professional’s Guide to Secure Intrusion Detection Systems,” Syngress Publishing, Burlington, 2003.
|
[3]
|
C. Endorf, E. Schultz and J. Mellander, “Intrusion Detection & Prevention,” McGraw-Hill, Boston, 2004.
|
[4]
|
“Technical Overview of The Bouncer,”
http://www.cobrador.net/docs/whitepaper.pdf
|
[5]
|
M. Barkett, “Intrusion Prevention Systems,” NFR Security, Inc., 2004.
http://www.nfr.com/resource/downloads/SentivistIPS-WP.pdf
|
[6]
|
K. Xinidis, K. G. Anagnostakis and E. P. Markatos, “Design and Implementation of a High Performance Network Intrusion Prevention System,” Proceedings of the 20th International Information Security Conference (SEC 2005), Makuhari-Messe, Chiba, 30 May-1 June, 2005.
|
[7]
|
T. Sproul and J. Lockwood, “Wide-Area Hardware-Ac- celerated Intrusion Prevention Systems (WHIPS),” Proceedings of the International Working Conference on Active Networking (IWAN), Lawrence, 27-29 October 2004.
|
[8]
|
D. Sarang, K. Praveen, T. S. Sproull and J. W. Lockwood, “Deep Packet Inspection Using Parallel Bloom Filters,” IEEE Micro, Vol. 24, No. 1, 2004., pp. 52-61.
|
[9]
|
D. V. Schuehler, J. Moscola and J. W. Lockwood, “Architecture for a Hardware-Based, TCP/IP Content- Processing System”, IEEE Micro, Vol. 24, No. 1, 2004, pp. 62-69.
|
[10]
|
H. Song and J. W. Lockwood, “Efficient Packet Classification for Network Intrusion Detection Using FPGA,” Proceedings of the International Symposium on Field- Programmable Gate Arrays (FPGA’05), Monterey, 20-22 February, 2005.
|
[11]
|
J. Yen and R. Langari, “Fuzzy Logic: Intelligence, Control and Information,” Prentice Hall, Upper Saddle River NJ, 1999.
|
[12]
|
http://tools.ietf.org/html/rfc1918
|
[13]
|
M. S. Abadeh, J. Habibi and C. Lucas, “Intrusion Detection Using a Fuzzy Genetics-Based Learning Algorithm,” Journal of Network and Computer Applications, Vol. 30, No. 2007, 2007, pp. 414-428.
|