1[1]Stoll C. Stalking the wily hacker[J]. Communications of the ACM,1988, 31(5) :484 -497.
2[2]Cheswick B. An Evening with Berferd In Which a Cracker is Lured,Endured, and Studied[ A]. Proceedings of the Winter 1992 Usenix conference[ C], 1992.
3[3]Cohen F. Internet Holes - Internet Lightning Rods[ J/OL]. Network Security Magazine, http://all. net/journal/netsec/9607 -2. html,1996.
4[4]Cohen F. A Note on the Role of Deception in Information Protection[J]. Computers and Security, 1998, 17:483 - 506.
5[5]Cohen F. A Mathematical Structure of Simple Defensive Network Deceptions[J]. Computers and Security, 2000, 19:520 -528.
6[6]Cohen F. Deception Toolkit [ EB/OL]. http://www. all. net/dtk,1998.