[1] REHMAN, Rafeeq Ur. Intrusion Detection Systems
with Snort. Prentice Hall PTR, New Jersey, USA, 2003.
[2] Honey Pot Project, em http://project.honeynet.org/
[3] Snort, em http://www.snort.org
[4] IDS detection approaches, em http://seclists.org/focus-ids/2007/Oct/0014.html
[5] Focus on IDS, em http://www.securityfocus.com/
[6] IDS, what is it and why do we need it?, em www.ixact.ch/english/pagesnav/framesE4.htm?IN&IN_Im.htm
[7] An Introduction to IDS, em http://www.securityfocus.com/infocus/1520
[8] Host-Based IDS vs Network-Based IDS, em http://www.windowsecurity.com/articles/Hids_vs_Nids_Part1.html
[9] Amorim, M E; Maestrelli, M. Sistemas de Detecção de Intrusos. CAT Informática, CBPF-NT-009/04.
[10] Intrusion Detection Systems, em http://www.windowsecurity.com/articles/Intrusion.html |