3HOLZ T.Learning more about attack patterns with honeypots[EB/OL].[2007-01-21].http://honeyblog.org/junkyard/2006-attack_patterns-sicherheit06.pdf.
4HOLZ T,KOETTER M.The German honeyclient project[EB/OL].[2007-01-21].http://www.chicagohoneynet.org/german-honeypot-holz.pdf.
5WANG K.Using honeyclients to detect new attacks[C/OL]// RECON 2005.[2007-01-05].http://www.synacklabs.net/honeyclient/Wang-Honeyclients-RECON.pdf.
6WANG Y-M,BECK D,JIANG X X,et al.Automated web patrol with strider HoneyMonkeys:finding web sites that exploit browser vulnerabilities[C]// Proceedings of the 13th Network and Distributed System Security Symposium.San Diego,California:[s.n.],2006.
7MOSHCHUK A,BRAGIN T,GRIBBLE S D,et al.A crawler-based study of spyware on the web[EB/OL].[2007-01-05].http://www.cs.washington.edu/homes/gribble/papers/spycrawler.pdf.