REFERENCES - DSpace@UM
REFERENCES - DSpace@UM
REFERENCES - DSpace@UM
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>REFERENCES</strong><br />
Allison Haines,(2003), “Information Security Hype Cycle Declares Intrusion Detection<br />
Systems a Market Failure. Money slated for Intrusion Detection Should be invested in Fir<br />
ewalls”, [Online] http://www.gartner.com/5_about/press_releases/pr11june2003c.jsp<br />
[Accessed 12 th December 2006]<br />
Andrew Plato.,(2006), [Online] http://www.safensoft.com/security.phtml?c=587<br />
[Accessed 20 th June 2007]<br />
Avner Kashtan.,(2007)[Online]<br />
http://weblogs.asp.net/avnerk/archive/2007/05/08/setting-windows-service-account-cand-wmi.aspx<br />
[Accessed 7 th June 2008]<br />
Benjamin Tomhave, (2004), [Online] http://falcon.secureconsulting.net/professional/pap<br />
ers/218-Research-Paper-FINAL.pdf [Accessed 22 nd April 2007]<br />
Benjamin Watson, et al., (2004), [Online] http://csdl2.computer.org/persagen/DLAbsTo<br />
c.jsp?resourcePath=/dl/proceedings/&toc=comp/proceedings/vizsec/2005/2782/00/2782t<br />
oc.xml&DOI=10.1109/VIZSEC.2005.7 [Accessed 22 nd April 2007]<br />
Brent, Huston, (2006), Keep on the lookout for toll call fraud in Security IT World , [On<br />
line] http://security.itworld.com/nl/security_strat/09262006/ [ Accessed 7 th June 2007]<br />
Brett Schklar, (2004), Preventing Fraud and Identify theft, Page 2-24<br />
Campbell Calif (2007),[Online] http://searchwindowssecurity.techtarget.com/news/colu<br />
mn/0,294698,sid45_gci1089830,00.html [Accessed 15 th June 2007]<br />
Carl Endorf et al., (2004), Intrusion Detection & Prevention, Page 4<br />
Charles Greenidge et al, (2005), [Online] http://scitec.uwichill.edu.bb/cmp/online/cs22l<br />
/waterfall_model.htm [Accessed 23 rd November 2007]<br />
Chris Brenton, (2005), Mastering Network Security, Page 203 – 204<br />
Chris , Vicklund , (2005), Identifying threats in Wireless Environment, Page 6 [Online],<br />
http://epubl.luth.se/1402-1617/2005/234/LTU-EX-05234-SE.pdf.<br />
[Accessed 16 th December 2006]<br />
Chris Williams , (2005), Intrusion Prevention and Active Response: Deploying Network<br />
and Host IPS, Page 193 – 196<br />
153
Computer Security Institute, (2008), Tips and techniques to protect your information<br />
in Frontline News Letter, 2008 [Online] http://i.cmpnet.com/v2.gocsi.com/pdf/WinterFL<br />
08sample.pdf [ Accessed 20 th January 2008]<br />
Computer Systems Laboratory Bulletin, (1994), [Online], http://csrc.nist.gov/publicati<br />
ons/nistbul/csl94-03.txt [Accessed 15 th March 2007]<br />
Computer Systems Laboratory Bulletin, (1994), Threats to Computer System,<br />
[Online], ftp://ciac.llnl.gov/pub/ciac/secdocs/nist/csl03-94.txt [Accessed 4 th August 2007]<br />
Cummings, Joanne, (2002), “From intrusion detection to intrusion prevention”,<br />
Network World, 2002 [Online] http://www.nwfusion.com/buzz/2002/intruder.html<br />
[Accessed 12 th December 2006]<br />
Curtis, B., Krasner et al., (1987), On Building software process models under lamppost<br />
” In proceeding of the 9 th International Conference.<br />
Daniel Briere et. al,(2002), Intrusion Prevention Systems complete security, [Online],<br />
http://www.networkworld.com/edge/columnists/2002/1015bleed.html [Accessed 8 th<br />
February 2007]<br />
Daniel, Sieberg (2002), Cable News Network. FBI: Cybercrime Rising. http://www.cnn.<br />
com/2002/TECH/internet/04/07/cybercrime.survey. [Accessed 20 th December 2006]<br />
David Fletcher, (2000), Software Testing and Quality Assurance, Page 2-4.<br />
Dawn Cappelli et al., (2007), Common Sense Guide to Prevention and Detection of<br />
Insider Threats in The technology Portal for Crypthography & Network Security Journal,<br />
Edition 2, [Online] http://www.securitytechnet.com [Accessed 11 th September 2007]<br />
154
Desai, Neil, (2003), Intrusion Prevention Systems: the Next Step in the Evolution<br />
of IDS in Security Focus, 2003, [Online] http://www.securityfocus.com/infocus/1670<br />
[Accessed 12 th July 2007]<br />
Dieter Gollmann.,(2006), Computer Security, 2 nd Edition, Page 4<br />
Dougles E.Comer,(2001), Computer Networks and Internets with internet application,<br />
Prentice Hall, 2001<br />
Dowell, D. and Ramstedt, (1990), Misuse intrusion architecture: Prevent, Detect, and<br />
Monitor , [Online], http://icsa.cs.up.ac.za/issa/2005/Proceedings/Poster/079_Article.pdf<br />
[Accessed 15 th March 2007]<br />
Federal Trade Commission, (2006), Consumer Fraud and Identify Theft, [Online]<br />
http://www.consumer.gov/sentinel/pubs/Top10Fraud2005.pdf [Accessed 12 th December<br />
2006]<br />
François Paget, (2007), Identity Theft, Page 10 – 14<br />
Gartner Inc, (2003), [Online] Intrusion Detection and Prevention All About IPS & IDS,<br />
http://www.webopedia.com/DidYouKnow/Computer_Science/2005/intrusion_detection_<br />
prevention.asp [Accessed 15 th May 2007]<br />
Harold F. Tipton et al., (2004), Information Security Management Handbook, Volume<br />
2, Fifth Edition, Page 5-16<br />
Herbert H. Thompson, et.al.,(2004), Intrusion detection Perspectives on the insider<br />
threat [Online], http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6VNT<br />
4BHH7PT 7&_user=5121449&_coverDate=01%2F31%2F2004&_rdoc=1&_fmt=&_ori<br />
g=search&_sort=d&view=c&_acct=C000061047&_version=1&_urlVersion=0&_userid=<br />
5121449&md5=0e5dd00e529b4192061fc7f970ca7b3d [Accessed 20 th December 2007]<br />
155
Honeynets, (2007), [Online] http://www.honeynets.com [Accessed 7 th June 2007]<br />
Householder A. et al.,(2001), “Managing the Threat of Denial-of-Service-Attacks”,<br />
2001, Page 1<br />
Iain Thomson, (2007), US hackers crack al Qaeda computers, [Online], http://www.vnu<br />
net.com/vnunet/news/2201175/white-house-leak-harms [Accessed 20 th December 2007]<br />
I, Brian (2004), [Online] http://www.programmingtalk.com/showthread.php?t=5907<br />
[Accessed 4 th April 2008]<br />
Ian Sommerville, (2006), Software Engineering , Page 14 - 52<br />
Innella, Paul, (2001), “The Evolution of Intrusion Detection Systems.”, [Online],<br />
http://www.securityfocus.com/infocus/1514 [Accessed 23 rd November 2006]<br />
Jakub Botwicz, (2006), Building Dependable Intrusion Prevention Systems,<br />
Page 135 –142<br />
James P. Anderson,( 1980),“Computer Security Threat Monitoring and Surveillance.”<br />
[Online],http://seclab.cs.ucdavis.edu/projects/history/papers/ande80.pdf. [Accessed 16 th<br />
December 2006]<br />
Jeff Reinhard, 2005, [Online], http://www.penteledata.net/aboutpenteledata/aboutpentel<br />
edata.shtml [Accessed 23 rd December 2006]<br />
James R.Chapman, 2004, [Online], http://www.hyperthot.com/pm_sdm.htm<br />
Joel Esleret al.,(2005), Snort IDS and IPS Toolkit: IDS and IPS toolkit, Page 25<br />
Joey Snynder, (2007) [Online] http://informationsecurity.techtarget.com/magItem/0,291<br />
266,sid42_gci1241705,00.html [Access 19 th May 2007 ]<br />
John R. Vacca ,(2005), Computer Forensics: Computer Crime Scene Investigation, Page<br />
319 – 333<br />
156
Karen Scarfone et al.,(2007), Guide to Intrusion Detection and Prevention Systems<br />
(IDPS), Chapter 2 – 7.<br />
Khaled Labib, (2005), Computer Security and Intrusion Detection, [Online],<br />
http://www.acm.org/crossroads/xrds11-1/csid.html [Accessed 7 th June 2007]<br />
Klaus, Majewski ,(2007), Network Stonegate Management [Online] http://www.stoneso<br />
ft.com/en/2007 [ Accessed 7 th June 2007]<br />
Laura Taylor, [2002], “Intrusion detection is not intrusion prevention”, [Online]<br />
http://articles.techrepublic.com.com/5100-10878_11-1051215.html [Accessed 16 th<br />
December 2006]<br />
Lichtenstein, (2000), The Sources of Internal Security Threat, [Online],<br />
http://icsa.cs.up.ac.za/issa/2005/Proceedings/Poster/079_Article.pdf [Accessed 21 st<br />
March 2007]<br />
Lindstrom, Pete, (2004), Guide to Intrusion Prevention, Page 38-45.<br />
Logu Krishnan, (2003) [Online]<br />
http://www.codeproject.com/KB/system/cstcpipwmi.aspx [Accessed 2 nd May 2008]<br />
Marci Denesiuk et al.,(2007),"Symantec Internet Security Threat Report"in The<br />
technology Portal for Crypthography & Network Security Journal,Volume 6,2007,<br />
http://www.securitytechnet.com. [Accessed 11 th September 2007]<br />
Michael Rash et al.,(2005), Intrusion Prevention and Active Response, 2005, Chapter 1<br />
& 7<br />
Michael Rash et al.,(2005), Intrusion Prevention and Active Response: Deploying<br />
Network and Host, Page 1-4<br />
Michele Jordan, (2006), Host Intrusion Prevention Systems, [Online],<br />
http://www.networkintrusion.co.uk/hips.htm [Accessed 8 th February 2007]<br />
Michele Jordan, (2007), Host Intrusion Prevention Systems [Online] www.mcafee.com<br />
[ Accessed 18 th June 2007]<br />
Moore D. et al.,(2002) “Inferring Internet Denial-of-Service Activity ”,2002, Page 2<br />
Whitten J.L et al.,(2002), System Analysis and Design Method 5 th Edition, 2002<br />
157
Nick Ierace et al.,(2005), Intrusion Prevention Systems. Page 1-3<br />
Timothy D. Wickham, (2003), Intrusion Detection is Dead. Long Live Intrusion<br />
Prevention. Page 5 – 14<br />
NSS Group, (2004), Intrusion Prevention Systems (IPS) [Online] ,<br />
http://www.nss.co.uk/WhitePapers/intrusion_prevention_systems.htm [Accessed 20 th<br />
February 2007]<br />
Pathogen, (2003), [Online] ,<br />
http://www.csharpfriends.com/Forums/ShowPost.aspx?PostID=9005 [Accessed 2 nd May<br />
2008]<br />
Peter A. Bromberg, [Online], http://www.eggheadcafe.com/articles/20030511.asp<br />
[Accessed 4 th May 2008]<br />
Pfleeger S.L.,(2001), Software Engineering Theory and Practice, (2 nd ed.)Upper Saddler<br />
River, New Jersey: Prentice Hall<br />
Phillippsohn, S. (2003), Monitoring employees to prevent and detect fraud, [Online],<br />
http://icsa.cs.up.ac.za/issa/2005/Proceedings/Poster/079_Article.pdf [Accessed 7 th March<br />
2007]<br />
Pressman S.Roger, (2001), Software Engineering: A Practitioner’s Approach, 5 th<br />
Edition. New York: McGraw Hill, International, Inc, Page 30 – 78.<br />
Qi Zhang, et al, (2004), [Online], http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber<br />
=1231412 [Accessed 4 th April 2007]<br />
Raja, Sanjay, (2005) “Network Intrusion Prevention” [Online] http://www.toplayer.com/<br />
generic/TLN_Stateful_WP.pdf [Accessed 12 th December 2006]<br />
Rebecca Bace, (2005), An Introduction to Intrusion Detection and Assessment, [Online],<br />
http://www.securityfocus.com/library/intrusion.pdf [Accessed 16 th June 2007]<br />
Renee Munshi,(2006), [Online] http://windowsitpro.com/article/articleid/49076/hostbased-intrusion-prevention-systems.html<br />
[Accessed 7 th June 2007]<br />
158
Ricky M. Magalhaes, (2006), Intrusion Detection [Online] ,<br />
http://www.windowsecurity.com/articles/Hids_vs_Nids_Part1.html [Accessed 8 th<br />
February 2007]<br />
Robert Jaques, (2005), [Online] http://www.vnunet.com/vnunet/news/2138597/internal-<br />
hackers-pose-biggest [Accessed 16 th June 2007]<br />
Ronald B. Standler, (2002), Computer Crime’[Online], http://www.rbs2.com/ccrime.ht<br />
m [Accessed 15 th June 2007]<br />
Security Threats, (2006), [Online] http://www.caci.com/business/ia/threats.html<br />
[Accessed 7 th May 2007]<br />
Sequeria, Dinesh, (2003), “Intrusion Prevention Systems: Security's Silver Bullet?”<br />
in Business Communications Review Journal, 2003, [Online] http://cnscenter.future.co.kr<br />
/resource/security/ids/03-03sequeira.pdf [Accessed 7 th May 2007]<br />
Snortsam, (2005), http://www.snortsam.net/ [Accessed 8 th March 2007]<br />
Sourcefire, (2005), Real-time Network Awareness, [Online],<br />
http://www.sourcefire.com/products/rna.html [Accessed 16 th December 2006]<br />
Sun Microsystem, Inc. (2007), Java Technology Overview. [Online] http://java.sun.com<br />
[Accessed 12 th December 2007]<br />
Symantec, (2007), [Online] www.symantec.com [ Accessed 7 th June 2007]<br />
Tech pro, (2007), [Online] http://www.tech-pro.net/defensewall-hips.html [ Accessed 7 th<br />
June 2007]<br />
Ted Holland, (2004), Using IPS and IDS together for Defense in Depth, [Online],<br />
https://www2.sans.org/reading_room/whitepapers/detection/1381.php, Page 7 – 8,<br />
[Accessed 20 th February 2007]<br />
159
Theo Mandel, (1997), The Elements of User Interface Design, Page 10 – 25<br />
Tunnissen, Jacco., (2004), "Intrusion Detection, Honeypots and Incident Handling<br />
Resources.", [Online], http://www.honeypots.net/ [Accessed 16 th December 2006]<br />
Wikipedia, (2007), [Online] http://www.honeynets.com [Accessed 23 th November 2007]<br />
Yaron Weinsberg et al.,(2006) [Online], http://www.cs.huji.ac.il/~dolev/pubs/hpsr-06-<br />
shimrit-1568979871.pdf [Accessed 4 th April 2007]<br />
160