07.03.2013 Views

REFERENCES - DSpace@UM

REFERENCES - DSpace@UM

REFERENCES - DSpace@UM

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>REFERENCES</strong><br />

Allison Haines,(2003), “Information Security Hype Cycle Declares Intrusion Detection<br />

Systems a Market Failure. Money slated for Intrusion Detection Should be invested in Fir<br />

ewalls”, [Online] http://www.gartner.com/5_about/press_releases/pr11june2003c.jsp<br />

[Accessed 12 th December 2006]<br />

Andrew Plato.,(2006), [Online] http://www.safensoft.com/security.phtml?c=587<br />

[Accessed 20 th June 2007]<br />

Avner Kashtan.,(2007)[Online]<br />

http://weblogs.asp.net/avnerk/archive/2007/05/08/setting-windows-service-account-cand-wmi.aspx<br />

[Accessed 7 th June 2008]<br />

Benjamin Tomhave, (2004), [Online] http://falcon.secureconsulting.net/professional/pap<br />

ers/218-Research-Paper-FINAL.pdf [Accessed 22 nd April 2007]<br />

Benjamin Watson, et al., (2004), [Online] http://csdl2.computer.org/persagen/DLAbsTo<br />

c.jsp?resourcePath=/dl/proceedings/&toc=comp/proceedings/vizsec/2005/2782/00/2782t<br />

oc.xml&DOI=10.1109/VIZSEC.2005.7 [Accessed 22 nd April 2007]<br />

Brent, Huston, (2006), Keep on the lookout for toll call fraud in Security IT World , [On<br />

line] http://security.itworld.com/nl/security_strat/09262006/ [ Accessed 7 th June 2007]<br />

Brett Schklar, (2004), Preventing Fraud and Identify theft, Page 2-24<br />

Campbell Calif (2007),[Online] http://searchwindowssecurity.techtarget.com/news/colu<br />

mn/0,294698,sid45_gci1089830,00.html [Accessed 15 th June 2007]<br />

Carl Endorf et al., (2004), Intrusion Detection & Prevention, Page 4<br />

Charles Greenidge et al, (2005), [Online] http://scitec.uwichill.edu.bb/cmp/online/cs22l<br />

/waterfall_model.htm [Accessed 23 rd November 2007]<br />

Chris Brenton, (2005), Mastering Network Security, Page 203 – 204<br />

Chris , Vicklund , (2005), Identifying threats in Wireless Environment, Page 6 [Online],<br />

http://epubl.luth.se/1402-1617/2005/234/LTU-EX-05234-SE.pdf.<br />

[Accessed 16 th December 2006]<br />

Chris Williams , (2005), Intrusion Prevention and Active Response: Deploying Network<br />

and Host IPS, Page 193 – 196<br />

153


Computer Security Institute, (2008), Tips and techniques to protect your information<br />

in Frontline News Letter, 2008 [Online] http://i.cmpnet.com/v2.gocsi.com/pdf/WinterFL<br />

08sample.pdf [ Accessed 20 th January 2008]<br />

Computer Systems Laboratory Bulletin, (1994), [Online], http://csrc.nist.gov/publicati<br />

ons/nistbul/csl94-03.txt [Accessed 15 th March 2007]<br />

Computer Systems Laboratory Bulletin, (1994), Threats to Computer System,<br />

[Online], ftp://ciac.llnl.gov/pub/ciac/secdocs/nist/csl03-94.txt [Accessed 4 th August 2007]<br />

Cummings, Joanne, (2002), “From intrusion detection to intrusion prevention”,<br />

Network World, 2002 [Online] http://www.nwfusion.com/buzz/2002/intruder.html<br />

[Accessed 12 th December 2006]<br />

Curtis, B., Krasner et al., (1987), On Building software process models under lamppost<br />

” In proceeding of the 9 th International Conference.<br />

Daniel Briere et. al,(2002), Intrusion Prevention Systems complete security, [Online],<br />

http://www.networkworld.com/edge/columnists/2002/1015bleed.html [Accessed 8 th<br />

February 2007]<br />

Daniel, Sieberg (2002), Cable News Network. FBI: Cybercrime Rising. http://www.cnn.<br />

com/2002/TECH/internet/04/07/cybercrime.survey. [Accessed 20 th December 2006]<br />

David Fletcher, (2000), Software Testing and Quality Assurance, Page 2-4.<br />

Dawn Cappelli et al., (2007), Common Sense Guide to Prevention and Detection of<br />

Insider Threats in The technology Portal for Crypthography & Network Security Journal,<br />

Edition 2, [Online] http://www.securitytechnet.com [Accessed 11 th September 2007]<br />

154


Desai, Neil, (2003), Intrusion Prevention Systems: the Next Step in the Evolution<br />

of IDS in Security Focus, 2003, [Online] http://www.securityfocus.com/infocus/1670<br />

[Accessed 12 th July 2007]<br />

Dieter Gollmann.,(2006), Computer Security, 2 nd Edition, Page 4<br />

Dougles E.Comer,(2001), Computer Networks and Internets with internet application,<br />

Prentice Hall, 2001<br />

Dowell, D. and Ramstedt, (1990), Misuse intrusion architecture: Prevent, Detect, and<br />

Monitor , [Online], http://icsa.cs.up.ac.za/issa/2005/Proceedings/Poster/079_Article.pdf<br />

[Accessed 15 th March 2007]<br />

Federal Trade Commission, (2006), Consumer Fraud and Identify Theft, [Online]<br />

http://www.consumer.gov/sentinel/pubs/Top10Fraud2005.pdf [Accessed 12 th December<br />

2006]<br />

François Paget, (2007), Identity Theft, Page 10 – 14<br />

Gartner Inc, (2003), [Online] Intrusion Detection and Prevention All About IPS & IDS,<br />

http://www.webopedia.com/DidYouKnow/Computer_Science/2005/intrusion_detection_<br />

prevention.asp [Accessed 15 th May 2007]<br />

Harold F. Tipton et al., (2004), Information Security Management Handbook, Volume<br />

2, Fifth Edition, Page 5-16<br />

Herbert H. Thompson, et.al.,(2004), Intrusion detection Perspectives on the insider<br />

threat [Online], http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6VNT<br />

4BHH7PT 7&_user=5121449&_coverDate=01%2F31%2F2004&_rdoc=1&_fmt=&_ori<br />

g=search&_sort=d&view=c&_acct=C000061047&_version=1&_urlVersion=0&_userid=<br />

5121449&md5=0e5dd00e529b4192061fc7f970ca7b3d [Accessed 20 th December 2007]<br />

155


Honeynets, (2007), [Online] http://www.honeynets.com [Accessed 7 th June 2007]<br />

Householder A. et al.,(2001), “Managing the Threat of Denial-of-Service-Attacks”,<br />

2001, Page 1<br />

Iain Thomson, (2007), US hackers crack al Qaeda computers, [Online], http://www.vnu<br />

net.com/vnunet/news/2201175/white-house-leak-harms [Accessed 20 th December 2007]<br />

I, Brian (2004), [Online] http://www.programmingtalk.com/showthread.php?t=5907<br />

[Accessed 4 th April 2008]<br />

Ian Sommerville, (2006), Software Engineering , Page 14 - 52<br />

Innella, Paul, (2001), “The Evolution of Intrusion Detection Systems.”, [Online],<br />

http://www.securityfocus.com/infocus/1514 [Accessed 23 rd November 2006]<br />

Jakub Botwicz, (2006), Building Dependable Intrusion Prevention Systems,<br />

Page 135 –142<br />

James P. Anderson,( 1980),“Computer Security Threat Monitoring and Surveillance.”<br />

[Online],http://seclab.cs.ucdavis.edu/projects/history/papers/ande80.pdf. [Accessed 16 th<br />

December 2006]<br />

Jeff Reinhard, 2005, [Online], http://www.penteledata.net/aboutpenteledata/aboutpentel<br />

edata.shtml [Accessed 23 rd December 2006]<br />

James R.Chapman, 2004, [Online], http://www.hyperthot.com/pm_sdm.htm<br />

Joel Esleret al.,(2005), Snort IDS and IPS Toolkit: IDS and IPS toolkit, Page 25<br />

Joey Snynder, (2007) [Online] http://informationsecurity.techtarget.com/magItem/0,291<br />

266,sid42_gci1241705,00.html [Access 19 th May 2007 ]<br />

John R. Vacca ,(2005), Computer Forensics: Computer Crime Scene Investigation, Page<br />

319 – 333<br />

156


Karen Scarfone et al.,(2007), Guide to Intrusion Detection and Prevention Systems<br />

(IDPS), Chapter 2 – 7.<br />

Khaled Labib, (2005), Computer Security and Intrusion Detection, [Online],<br />

http://www.acm.org/crossroads/xrds11-1/csid.html [Accessed 7 th June 2007]<br />

Klaus, Majewski ,(2007), Network Stonegate Management [Online] http://www.stoneso<br />

ft.com/en/2007 [ Accessed 7 th June 2007]<br />

Laura Taylor, [2002], “Intrusion detection is not intrusion prevention”, [Online]<br />

http://articles.techrepublic.com.com/5100-10878_11-1051215.html [Accessed 16 th<br />

December 2006]<br />

Lichtenstein, (2000), The Sources of Internal Security Threat, [Online],<br />

http://icsa.cs.up.ac.za/issa/2005/Proceedings/Poster/079_Article.pdf [Accessed 21 st<br />

March 2007]<br />

Lindstrom, Pete, (2004), Guide to Intrusion Prevention, Page 38-45.<br />

Logu Krishnan, (2003) [Online]<br />

http://www.codeproject.com/KB/system/cstcpipwmi.aspx [Accessed 2 nd May 2008]<br />

Marci Denesiuk et al.,(2007),"Symantec Internet Security Threat Report"in The<br />

technology Portal for Crypthography & Network Security Journal,Volume 6,2007,<br />

http://www.securitytechnet.com. [Accessed 11 th September 2007]<br />

Michael Rash et al.,(2005), Intrusion Prevention and Active Response, 2005, Chapter 1<br />

& 7<br />

Michael Rash et al.,(2005), Intrusion Prevention and Active Response: Deploying<br />

Network and Host, Page 1-4<br />

Michele Jordan, (2006), Host Intrusion Prevention Systems, [Online],<br />

http://www.networkintrusion.co.uk/hips.htm [Accessed 8 th February 2007]<br />

Michele Jordan, (2007), Host Intrusion Prevention Systems [Online] www.mcafee.com<br />

[ Accessed 18 th June 2007]<br />

Moore D. et al.,(2002) “Inferring Internet Denial-of-Service Activity ”,2002, Page 2<br />

Whitten J.L et al.,(2002), System Analysis and Design Method 5 th Edition, 2002<br />

157


Nick Ierace et al.,(2005), Intrusion Prevention Systems. Page 1-3<br />

Timothy D. Wickham, (2003), Intrusion Detection is Dead. Long Live Intrusion<br />

Prevention. Page 5 – 14<br />

NSS Group, (2004), Intrusion Prevention Systems (IPS) [Online] ,<br />

http://www.nss.co.uk/WhitePapers/intrusion_prevention_systems.htm [Accessed 20 th<br />

February 2007]<br />

Pathogen, (2003), [Online] ,<br />

http://www.csharpfriends.com/Forums/ShowPost.aspx?PostID=9005 [Accessed 2 nd May<br />

2008]<br />

Peter A. Bromberg, [Online], http://www.eggheadcafe.com/articles/20030511.asp<br />

[Accessed 4 th May 2008]<br />

Pfleeger S.L.,(2001), Software Engineering Theory and Practice, (2 nd ed.)Upper Saddler<br />

River, New Jersey: Prentice Hall<br />

Phillippsohn, S. (2003), Monitoring employees to prevent and detect fraud, [Online],<br />

http://icsa.cs.up.ac.za/issa/2005/Proceedings/Poster/079_Article.pdf [Accessed 7 th March<br />

2007]<br />

Pressman S.Roger, (2001), Software Engineering: A Practitioner’s Approach, 5 th<br />

Edition. New York: McGraw Hill, International, Inc, Page 30 – 78.<br />

Qi Zhang, et al, (2004), [Online], http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber<br />

=1231412 [Accessed 4 th April 2007]<br />

Raja, Sanjay, (2005) “Network Intrusion Prevention” [Online] http://www.toplayer.com/<br />

generic/TLN_Stateful_WP.pdf [Accessed 12 th December 2006]<br />

Rebecca Bace, (2005), An Introduction to Intrusion Detection and Assessment, [Online],<br />

http://www.securityfocus.com/library/intrusion.pdf [Accessed 16 th June 2007]<br />

Renee Munshi,(2006), [Online] http://windowsitpro.com/article/articleid/49076/hostbased-intrusion-prevention-systems.html<br />

[Accessed 7 th June 2007]<br />

158


Ricky M. Magalhaes, (2006), Intrusion Detection [Online] ,<br />

http://www.windowsecurity.com/articles/Hids_vs_Nids_Part1.html [Accessed 8 th<br />

February 2007]<br />

Robert Jaques, (2005), [Online] http://www.vnunet.com/vnunet/news/2138597/internal-<br />

hackers-pose-biggest [Accessed 16 th June 2007]<br />

Ronald B. Standler, (2002), Computer Crime’[Online], http://www.rbs2.com/ccrime.ht<br />

m [Accessed 15 th June 2007]<br />

Security Threats, (2006), [Online] http://www.caci.com/business/ia/threats.html<br />

[Accessed 7 th May 2007]<br />

Sequeria, Dinesh, (2003), “Intrusion Prevention Systems: Security's Silver Bullet?”<br />

in Business Communications Review Journal, 2003, [Online] http://cnscenter.future.co.kr<br />

/resource/security/ids/03-03sequeira.pdf [Accessed 7 th May 2007]<br />

Snortsam, (2005), http://www.snortsam.net/ [Accessed 8 th March 2007]<br />

Sourcefire, (2005), Real-time Network Awareness, [Online],<br />

http://www.sourcefire.com/products/rna.html [Accessed 16 th December 2006]<br />

Sun Microsystem, Inc. (2007), Java Technology Overview. [Online] http://java.sun.com<br />

[Accessed 12 th December 2007]<br />

Symantec, (2007), [Online] www.symantec.com [ Accessed 7 th June 2007]<br />

Tech pro, (2007), [Online] http://www.tech-pro.net/defensewall-hips.html [ Accessed 7 th<br />

June 2007]<br />

Ted Holland, (2004), Using IPS and IDS together for Defense in Depth, [Online],<br />

https://www2.sans.org/reading_room/whitepapers/detection/1381.php, Page 7 – 8,<br />

[Accessed 20 th February 2007]<br />

159


Theo Mandel, (1997), The Elements of User Interface Design, Page 10 – 25<br />

Tunnissen, Jacco., (2004), "Intrusion Detection, Honeypots and Incident Handling<br />

Resources.", [Online], http://www.honeypots.net/ [Accessed 16 th December 2006]<br />

Wikipedia, (2007), [Online] http://www.honeynets.com [Accessed 23 th November 2007]<br />

Yaron Weinsberg et al.,(2006) [Online], http://www.cs.huji.ac.il/~dolev/pubs/hpsr-06-<br />

shimrit-1568979871.pdf [Accessed 4 th April 2007]<br />

160

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!