2[1]Stoll C. Stalking the wily hacker[J]. Communications of the ACM,1988, 31(5) :484 -497.
3[2]Cheswick B. An Evening with Berferd In Which a Cracker is Lured,Endured, and Studied[ A]. Proceedings of the Winter 1992 Usenix conference[ C], 1992.
4[3]Cohen F. Internet Holes - Internet Lightning Rods[ J/OL]. Network Security Magazine, http://all. net/journal/netsec/9607 -2. html,1996.
5[4]Cohen F. A Note on the Role of Deception in Information Protection[J]. Computers and Security, 1998, 17:483 - 506.
6[5]Cohen F. A Mathematical Structure of Simple Defensive Network Deceptions[J]. Computers and Security, 2000, 19:520 -528.
7[6]Cohen F. Deception Toolkit [ EB/OL]. http://www. all. net/dtk,1998.
3BRAIND,DAVISON,RURGERS,A Web Caching Primer[J].IEEE Internet Computing,2001 (5):38-45.
4S.Gupta,D.B.Skillicon.K:Improving atextual deception detection model Porceedings of the 2006 conference of the Center for Advanced Studies on Collaborative research CASCON' 06[R].Toronto,Canada:2006:10.