[1]陈勇君,古贵安,吴明蔚,等. Web20网站威胁趋势与根本防御之道[J]. Communications of the CCISA, 2009, 15(3):142157.[2]Yeh C H, Yang C H. Design and implementation of Honeypot systems based on opensource software[C]//IEEE International Conference on Intelligence and Security Informatics. Taiwan: IEEE Press, 2008: 265266.[3]Kuwatly I, Sraj M, Masri Z A, et al. A dynamic Honeypot design for intrusion detection[M]. Washington, DC: IEEE Computer Society, 2004.[4]Kumar R, Singh, Ramanujam T. Intrusion detection system using advanced Honeypots[J]. International Journal of Computer Science and Information Security, 2009, 2(1): 94102.[5]Clifford S. Stalking the wily hacker[J]. Communications of the ACM, 1988, 31(5): 484497.[6]Kumar S, Pant D. Detection and prevention of new and unknown malware using Honeypots[J]. International Journal on Computer Science and Engineering, 2009, 1(2): 5661.[7]Zaman S, Karray F. Lightweight IDS based on features selection and IDS classification scheme[C]//International Conference on Computational Science and Engineering. Canada: IEEE Press, 2009: 365370.