Minicursos do VIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais

Autores

Carlos Alberto Maziero (ed.)
PUCPR
Luciano Paschoal Gaspary (ed.)
UFRGS
Raul Fernando Weber (ed.)
UFRGS

Sinopse

O Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais (SBSeg) é um evento científico promovido anualmente pela Sociedade Brasileira de Computação (SBC) e representa o principal fórum no país para a apresentação de pesquisas e atividades relevantes ligadas à segurança da informação e de sistemas

Este livro reúne os quatro capítulos produzidos pelos autores das propostas de minicursos aceitas para apresentação no SBSeg 2008.

O Capítulo 1, "Gestão de Riscos", apresenta aspectos teóricos e práticos da gestão de riscos, fornecendo aos alunos uma base para desenvolverem seus próprios projetos. Espera-se, portanto, com esse curso, contribuir para um melhor entendimento da metodologia de gestão de riscos.

O Capítulo 2, "Segurança em Redes Mesh: Tendências, Desafios e Aplicações", apresenta, de maneira teórica, os principais problemas de segurança em redes mesh e a discussão de soluções propostas para solucioná-los. O capítulo tem três focos principais: a contextualização das redes mesh; o estado da arte e as questões de segurança em redes em malha sem fio, com seus desafios e deficiência e as principais propostas encontradas na literatura.

O Capítulo 3, "Tráfego Internet não Desejado: Conceitos, Caracterização e Soluções", apresenta o universo do tráfego não desejado, incluindo definições, classificação e os motivos que explicam seu surpreendente crescimento. Além disso, aponta as deficiências das soluções existentes e recentes para detecção de tráfego indesejado. Por fim, este capítulo apresenta potenciais soluções e enumera temas de pesquisa em aberto sobre tráfego não desejado na Internet.

O Capítulo 4, "Virtualização: Conceitos e Aplicações em Segurança", apresenta os fundamentos conceituais sobre máquinas virtuais, discute as vantagens e desvantagens no uso de máquinas virtuais, explora as principais possibilidades de uso de máquinas virtuais na área de segurança de sistemas e expõe alguns exemplos de ambientes de máquinas virtuais de uso corrente.

 

Capítulos:

1. Gestão de Riscos
José Eduardo Malta de Sá Brandão, Joni da Silva Fraga
2. Segurança em Redes Mesh: Tendências, Desafios e Aplicações
Elisangela Santana Aguiar, Rafael Lopes Gomes, Antônio Jorge Gomes Abelém, Douglas Brito Damalio, Billy Anderson Pinheiro
3. Tráfego Internet não Desejado: Conceitos, Caracterização e Soluções
Eduardo Feitosa, Eduardo Souto, Djamel Sadok
4. Virtualização: Conceitos e Aplicações em Segurança
Marcos Aurelio Pchek Laureano, Carlos Alberto Maziero

Downloads

Não há dados estatísticos.

Referências

ABNT (2006a). Código de Prática para a Gestão da Segurança da Informação. ABNT NBR ISO/IEC 27002:2005.

ABNT (2006b). Sistemas de Gestão de Segurança da Informação - Requisitos. ABNT NBR ISO/IEC 27001:2006.

ABNT (2008). Tecnologia da informação - Técnicas de segurança - Gestão de riscos de segurança da informação. ABNT NBR ISO/IEC 27005:2008.

Abry, P., Borgnat, P., e Dewaele, G. (2007) Sketch based anomaly detection, identification and performance evaluation. IEEE/IPSJ SAINT Measurement Workshop, páginas 80-84.

Akyildiz, I. F.; Wang, X. e Wang, W. (2005) Wireless Mesh Networks: a Survey. Comput. Netw. ISDN Syst. Janeiro.

Anderson, L., Davies, E., and Zhang, L. (2007) Report from the IAB workshop on Unwanted Traffic March 9-10 2006. RFC 4948. Internet Engineering Task Force.

Andreolini, M., Bulgarelli, A., Colajanni, M., e Mazzoni, F. (2005) HoneySpam: Honeypots Fighting Spam at the Source. Em International Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI’05), páginas 77-83.

Anton, E.R. Duart, O.C. (2002) “Group key establishment in wireless ad hoc networks”. In E.R. Workshop em Qualidade de Serviço e Mobilidade. Novembro.

Arbor Networks. (2005) Worldwide ISP Security Report. http://www.arbornetworks.com.

AS/NZS (2004a). Risk Management - AS/NZS4360:2004. Australian/ New Zealand Standard, third edition.

AS/NZS (2004b). Risk Management Guidelines Companion to AS/NZS 4360:2004 - HB 436:2004. Australian/New Zealand Standard, third edition.

Asokan N., Ginzborg P., (2000) “Key Agreement in Ad Hoc Networks”, Computer Communications Volume 23.

Athanasiades, N., Abler, R., Levine, J., Owen, H., and Riley, G. (2003). Intrusion detection testing and benchmarking methodologies. In IEEE-IWIA ’03: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA’03), page 63, Washington, DC, USA. IEEE Computer Society.

Badonnel, R., State, R., and Festor, O. (2005) “Management of mobile ad hoc networks: information model and probe-based architecture”. Int. J. Netw. Manag.

Bailey, M., Cooke, E., Jahanian, F., Nazario, J., Watson, D. (2005) The Internet Motion Sensor: A Distributed Blackhole Monitoring System. Em 12th Annual Network and Distributed System Security Symposium.

Baker, F., e Savola, P. (2004) Ingress Filtering for Multihomed Networks. BCP 84. RFC 3704. Internet Engineering Task Force.

Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., and Warfield, A. (2003). Xen and the art of virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, pages 164–177.

Barker, W. C. and Lee, A. (2004). Information security - volume ii: Appendices to guide for mapping types of information and information systems to security categories. NIST Special Publication 800-60.

Bass, T. (2004). Service-oriented horizontal fusion in distributed coordination-based systems. In IEEE MILCOM 2004, volume 2, pages 615–621, Monterey, CA, USA.

Bayer, U., Moser, A., Kruegel, C., and Kirda, E. (2006). Dynamic analysis of malicious code. Journal in Computer Virology, 2(1).

Beaucamps, P. and Filiol, E. (2007). On the possibility of practically obfuscating programs towards a unified perspective of code protection. Journal in Computer Virology, 3(1):3–21.

Becker K., Willie U., (1998) “Communication complexity of group key distribution”, Proceedings of 5th ACM Conference on Computer and Communications Security, ACM Press.

Bellard, F. (2005). QEMU, a fast and portable dynamic translator. In USENIX Annual Technical Conference.

Bernaille, L., Teixeira, R., Akodjenou, I., Soule, A., e Salamatian, K. (2006) Traffic Classification on the Fly. ACM SIGCOMM Computer. Communication Review, 36(2), páginas 23-26, Abril. ACM Press.

Bird R., Gopal I., Herzberg A., Janson P., Kutten S., Molva R. , Yung M., (1995) “The KryptoKnight family of light-weight protocols for authentication and key distribution“. IEEE/ACM Transactions on Networking, Volume 3 , Issue 1, Fevereiro.

Bishop, M. (2003). Computer Security: Art and Science. AddisonWesley, Bonston, MA.

Blakley, B., McDermott, E., and Geer, D. (2001). Information security is information risk management. In NSPW ’01: Proceedings of the 2001 workshop on New security paradigms, pages 97–104, New York, NY, USA. ACM Press.

Brandão, J. E. M. S. (2007). COMPOSIÇÕES DE IDSs: VIABILIZANDO O MONITORAMENTO DE SEGURANÇA EM AMBIENTES DE LARGA ESCALA. PhD thesis, Programa de Pós-Graduação em Engenharia Elétrica da Universidade Federal de Santa Catarina, Florianópolis, Santa Catarina.

Brandão, J. E. M. S., Fraga, J. S., and Mafra, P. M. (2006a). A New Approach for IDS Composition. In Proceedings of ICC 2006: IEEE International Conference on Communications, Istanbul, Turkey.

Brandão, J. E. M. S., Fraga, J. S., Mafra, P. M., and Obelheiro, R. R. (2006b). A WS-Based Infrastructure for Integrating Intrusion Detection Systems in Large-Scale Environments. In On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE, volume 4275 of Lecture Notes in Computer Science, pages 462–479, Montpellier, France. Springer Berlin / Heidelberg.

Bray, T., Paoli, J., and Sperberg-McQueen, C. M. (2004). Extensible Markup Language (XML) 1.0 (third edition)”. W3C Recommendation.

Breuel, Cristiano Malanga. (2004) “Redes em Malha sem Fios”. Instituto de Matemática e Estatística - Universidade de São Paulo (USP), Dezembro. Disponível em: [link]. Acessado em Janeiro de 2007.

Broch, J., Maltz, D., Johnson, D., Hu, Y. E Jetcheva, J. (1998) “A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols”. Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking. Outubro.

Bruno, R., Conti, M. e Gregori, E. (2005) “Mesh Networks: Commodity Multihop Ad Hoc Networks”. IEEE Communications Magazine. Março.

BS/ISO (2005). BS/ISO17799 Information technology – Code of practice for information security managementt. BS/ISO 17799:2005.

BSi (1999). Information Security Management, Part 1: Code of Practice for Information Security Management. BS 7799-1:1999.

BSi (2002). Information Security Management, Part 2: Specification with guidance for use. BS 7799-2:2002.

Capkun, S., Buttyan, L., and Hubaux, J.-P. (2003). “Self-organized public-key management for mobile ad hoc networks”. IEEE Transactions on Mobile Computing, Chen, W., Jain N., Singh S., (1999) “ANMP: Ad Hoc Network Management Protocol”, IEEE Journal on selected areas in communications, Vol. 17, No. 8, Agosto.

CERT – Computer Emergency Response Team. (2008) Denial of Service Attacks. http://www.cert.org/tech_tips/denail_of_service.html

CERT.br – Centro de Estudos, Resposta e Tratamento de Incidentes de Segurança no Brasil. (2008) Estatísticas do CERT.br. http://www.cert.br/stats/incidentes/

Charfi, A. and Mezini, M. (2005). Using aspects for security engineering of web service compositions. In ICWS ’05: Proceedings of the IEEE International Conference on Web Services (ICWS’05), pages 59–66, Washington, DC, USA. IEEE Computer Society.

Chiang, C., Wu, H., Liu, W., Gerla, M. (1997) “Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel”. IEEE Singapore International Conference on Networks (SICON), pp. 197-211, Abril.

Choi, C., Dong, Y., e Zhang, Z. (2005) LIPS: Lightweight Internet Permit System for Stopping Unwanted Packets. Lecture Notes in Computer Science, páginas 178-190. Springer.

Cisco Systems. (2006) Introduction to Cisco IOS NetFlow - A Technical Overview. White Paper. [link].

Cisco Systems. (2008) Network Admission Control. http://www.cisco.com/en/US/netsol/ns466/networking_solutions_package.html

Clark, C., Fraser, K., Hand, S., Hansen, J., Jul, E., Limpach, C., Pratt, I., and Warfield, A. (2005). Live migration of virtual machines. In 2nd Symposium on Networked Systems Design and Implementation.

Cooke, E., Bailey, M., Watson, D., Jahanian, F., e Nazario, J. The Internet Motion Sensor: A Distributed Blackhole Monitoring System. Technical Report CSE-TR-491-04, University of Michigan, Eletrical Engineering and Computer Science.

Crovella, M., e Krishnamurthy, B. (2006) Internet Measurement: Infrastructure, Traffic and Applications. John Wiley & Sons, Inc., Nova Yorque, NY, USA.

Dacier, M. (2002). Design of an intrusion-tolerant intrusion detection system. maftia project, deliverable 10. Technical report, IBM Zurich Research Laboratory.

Davies, E. (2007) Unwanted Traffic. IETF Journal, volume 3, Dezembro. http://www.isoc.org/tools/blogs/ietfjournal/?p=172

Debar, H., Dacier, M., Wespi, A., and Lampart, S. (1998). An Experimentation Workbench For Intrusion Detection Systems. Technical report, IBM, IBM Research, Zurich Research Laboratory.

Demchenko, Y., Gommans, L., de Laat, C., and Oudenaarde, B. (2005). Web services and grid security vulnerabilities and threats analysis and model. In Proceedings of the "6th IEEE/ACM International Workshop on Grid Computing, pages 262–267, Seattle, Washington, USA. IEEE Cat. No. 05EX1210C.

Dewaele, G., Fukuda, K., Borgnat, P., Abry, P., e Cho, K. (2007) Extracting Hidden Anomalies using Sketch and Non Gaussian Multiresolution Statistical Detection Procedures. ACM SIGCOMM Workshop on Large-Scale Attack Defense (LSAD), páginas 145-152.

Dike, J. (2000). A user-mode port of the Linux kernel. In Proceedings of the 4th Annual Linux Showcase & Conference, Atlanta - USA.

Duan, Z., Gopalan, K., e Dong, Y. (2005) Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic. Em International Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI’05).

Duarte, J. (2008) “Escalabilidade, Gerência e Mobilidade para Redes Mesh de Acesso à Internet”. Dissertação de Mestrado, instituição Universidade Federal Fluminense – UFF.

Duarte, J.L.; Passos, D.; Valle, R.L.; Oliveira, E.; Muchaluat-Saade, D.; Albuquerque, C.V. (2007). “Management Issues on Wireless Mesh Networks”. Latin American Network Operations and Management Symposium (LANOMS), pp. 8 – 19. Setembro.

Duesterwald, E. (2005). Design and engineering of a dynamic binary optimizer. Proceedings of the IEEE, 93(2):436–448.

Dunia, R., e Qin, S. J. (1998) A subspace approach to multidimensional fault identification and reconstruction. American Institute of Chemical Engineers (AIChE) Journal, páginas 1813–1831.

Dunlap, G. W., King, S. T., Cinar, S., Basrai, M. A., and Chen, P. M. (2002). Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI).

Durst, R., Champion, T., Witten, B., Miller, E., and Spagnuolo, L. (1999). Testing and evaluating computer intrusion detection systems. Commun. ACM, 42(7):53–61.

Eichin, M. e Rochlis, J. (1988) With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. Em IEEE Computer Society Symposium on Security and Privacy.

Erl, T. (2004) Service-Oriented Architecture: A Field Guide to Integrating XML and Web Services. Prentice Hall PTR, Upper Saddle River, NJ, USA.

Esfandiari, B. and Tosic, V. (2004). Requirements for web service composition management. In Proc. of the 11th Hewlett-Packard Open View University Association (HP-OVUA) Workshop, Paris, France. Hewlett-Packard.

Esfandiari, B. and Tosic, V. (2005). Towards a web service composition management framework. In ICWS, pages 419–426. IEEE Computer Society.

Faccin, S., Wijting, C., Kneckt, J. e Damle, A. (2006) “Mesh WLAN Networks: Concept and System Design”. IEEE Wireless Communications. Abril.

Feiertag, R., Redmond, T., and Rho, S. (2000). A framework for building composable replaceable security services. In DARPA Information Survivability Conference & Exposition, volume 2, pages 391–402.

Ferguson, P., e Senie, D. (2000) Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. BCP 38. RFC 2827. Internet Engineering Task Force.

Feroul, M., Roth, M., McGibney, J., Scheffler, T., e Waller, A. (2005) Anomaly Detection System Study. SEINIT Project. http://www.seinit.org/documents/Deliverables/SEINIT_D2.5_PU.pdf.

Ferre, M. R., Pomeroy, D., Wahlstrom, M., and Watts, D. (2006). Virtualization on the IBM System x3950 Server. IBM RedBooks. http://www.redbooks.ibm.com.

Frincke, D. (2000). Balancing cooperation and risk in intrusion detection. ACM Trans. Inf. Syst. Secur., 3(1):1–29.

Fu, S. and Xu, C.-Z. (2005). Service migration in distributed virtual machines for adaptive grid computing. In 34th IEEE Intl Conference on Parallel Processing.

G. Pei, M. Gerla, Tsu-Wei Chen (2000) "Fisheye State Routing: A Routing Scheme for Ad Hoc Wireless Networks," IEEE ICC, vol. 1, pp. 70-74.

Gao, J., Hu, G., Yao, X., e Chang, R. (2006) Anomaly Detection of Network Traffic Based on Wavelet Packet. Em Asia-Pacific Conference on Communications (APPC'06).

Garfinkel, S., Spafford, G., and Schwartz, A. (2003). Practical Unix and Internet security (3rd ed.). O’Reilly & Associates, Inc., Sebastopol, CA, USA, third edition.

Garfinkel, T. and Rosenblum, M. (2003). A virtual machine introspection based architecture for intrusion detection. In Proceedings of the 2003 Network and Distributed System Security Symposium.

Garfinkel, T., Adams, K., Warfield, A., and Franklin, J. (2007). Compatibility is not transparency: VMM detecion myths and realities. Technical report, TRUST - The Team for Research in Ubiquitous Secure Technology.

Goldberg, R. (1973). Architecture of virtual machines. AFIPS National Computer Conference.

Goldberg, R. and Mager, P. (1979). Virtual machine technology: A bridge from large mainframes to networks of small computers. IEEE Proceedings Compcon Fall 79, pages 210–213.

Gomes, L. H., Castro, F., Almeida, V., Almeida, J., e Almeida, R. (2005) Improving Spam Detection Based on Structural Similarity. Em International Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI’05), páginas 89-95.

GT-Mesh (2006) “RT1 – Termo de referência e estado da arte”. Disponível em <http://mesh.ic.uff.br>. Acessado em Junho de 2008.

Haas, Z. e Pearlman, M. (1998) "The zone routing protocol (ZRP) for ad hoc networks". Internet-Draft, draft-ietf-manet-zone-zrp-04.txt. Agosto.

Haas, Z.J. (1997) “A new routing protocol for the reconfigurable wireless networks”, IEEE Computer Society. Vol 2. pp. 562-566.

Hamid, Md. Abdul; Islam, Md. Shariful; Hong, Choong Seon. (2008). “Developing Security Solutions for Wireless Mesh Enterprise Networks”. IEEE Wireless Communications and Networking Conference (WCNC) 2008, pp. 2549 – 2554, Abril.

Hamid, Md. Abdul; Islam, Md. Shariful; Hong, Choong Seon. (2008). “Misbehavior Detection in Wireless Mesh Networks”. International Conference on Advanced Communication Technology (ICACT), Vol. 2, pp. 1167 – 1169, Fevereiro.

Hamid, Z., Khant, S. (2006) “An Augmented Security Protocol for WirelessMAN Mesh Networks”. IEEE.

Han, J. and Zheng, Y. (2000). Security characterisation and integrity assurance for software components and component-based systems. In International Conference on Software Methods and Tools, pages 61–66. IEEE Computer Society Press.

Haq, A., Naveed, A., Kanhere, S. (2007) “Securing Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks”. IEEE Communications Society subject matter experts for publication in the WCNC 2007 proceedings.

Harada, Eduardo. (2006) “Wireless Mesh Networks: Uma tecnologia que promete”, Disponível em <http://sisnema.com.br/Materias/idmat017459.htm>. Acessado em Junho de 2008.

Heidari, M. (2004) Malicious Codes in Depth. http://www.securitydocs.com.

Held, G. (2005) “Wireless Mesh Networks”. 1ª Edição. USA, Auerbach Publications – Taylor & Francis Group.

Herder, J. N., Bos, H., Grass, B., Homburg, P., and Tanenbaum, A. S. (2006). Reorganizing UNIX for reliability. In Proceedings of 11th Asia-Pacific Computer Systems Architecture Conference, pages 81–94.

Hiertz, G., Zang, Y., Max, S., Junge, T., Weiss, E., Wolz, B. (2008) “IEEE 802.11s: WLAN Mesh Standardization and High Performance Extensions”. IEEE Network, Junho.

Hoepers, C., Stending-Jenssen, K. e Montes, A. (2003) Honeynets Applied to the CSIRT Scenario. http://www.honeynet.org.br/papers/hnbr-first2003.pdf

Honeynet Project (2001). Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community. Addison-Wesley.

Honeynet Project (2003). Know your enemy: defining virtual honeynets. http://project.honeynet.org.

Hong, F.; Fu, L. H. C. “Advanced Information Networking and Applications”, IEEE Computer Society, vol. 1. 2005, pp. 713-718.

Hu, Y. C., Perrig, A. (2004) “A Survey of Secure Wireless Ad Hoc Routing”, IEEE Computer Society, vol. 2, pp. 28-29.

Hu, Y. C., Perrig, A., Johnson, D. B. (2005) “Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks”. Portal ACM. vol. 11, pp. 21-38.

Hu, Y. C., Perrig, A., Johnson, D. B., (2003) “SEAD: Secure Efficient Distance Vector Routing for Mobile wireless ad hoc networks”. IEEE Computer Society. vol. 1. pp. 3-13.

Huang, R., Zhang, C., Fang, Y., (2007) “A Mobility Management Scheme for Wireless Mesh Networks”. IEEE Communications Society subject matter experts for publication in the IEEE GLOBECOM 2007 proceedings.

Hyatt, R. (2006). Keeping DNS trustworthy. The ISSA Journal, páginas. 37-38.

IBM (2007). Power Instruction Set Architecture – Version 2.04. IBM Corporation.

IEEE (2007). IEEE Standard for Information Technology Telecommunications and Information Exchange between Systems-local and Metropolitan Area Networks Specific Requirements parte 11: Wireless lan medium access control (mac) and physical layer (phy) specifications. IEEE Std 802.11-2007 (Revisão de IEEE Std 802.11-1999).

IEEE (2008) “Task Group S. Status of Project IEEE 802.11s”. Disponível em <http://www.ieee802.org/11/Reports/tgs_update.htm>. Acessado em Junho de 2008.

IEEE (2000). IEEE Standard Specifications for Public-Key Cryptography. IEEE Std 1363-2000.

Islam, Md. Shariful; Hamid, Md. Abdul; Hong, Choong Seon; Chang, Beom-Hwan. (2008). “Preserving Identity Privacy in Wireless Mesh Networks”. International Conference on Information Networking (ICOIN) pp. 1 – 5, Janeiro.

ISO (1989). Information processing systems - open systems interconnection - basic reference model - part 2: Security architecture. ISO 7498-2.

ISO (2002). Risk management - Vocabulary - Guidelines for use in standards. ISO/IEC Guide 73:2002.

ISO (2007). Risk management - guidelines on principles and implementation of risk management. ISO/TMB WG on Risk management N 047.

ISO/IEC (2005a). Common criteria for information technology security evaluation - part 1: Introduction and general model. ISO/IEC 15408:2005.

ISO/IEC (2005b). Common criteria for information technology security evaluation - part 2: Security functional requirements. ISO/IEC 15408:2005.

ISO/IEC (2005c). Common criteria for information technology security evaluation - part 3: Security assurance requirements. ISO/IEC 15408:2005.

Janies, J.; Chin-Tser Huang; Johnson, N.L. (2006) “SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks”. IEEE International Conference on Communications (ICC), Vol. 8, Issue , pp. 3663 – 3669, Junho.

Joa-Ng, M., Lu, I. T. (1999) “A Peer-to-Peer zone-based two-level link state routing for mobile Ad Hoc Networks”. IEEE Journal on Selected Areas in Communications, Special Issue on Ad-Hoc Networks, pp.1415-25, Agosto.

Jongtack, Kim; Saewoong, Bahk. (2008) “Distributed Certification Authority in Wireless Mesh Networks”. IEEE Consumer Communications and Networking Conference (CCNC), pp. 267 – 271, Janeiro.

Ju, N., Ju,D., Santhanam, L., He, B., Wang, J., Agrawal, D., (2007) “Wireless Mesh Networks: Current Challenges and Future Directions of Web-in-The-Sky”. IEEE Wireless Communications, Agosto.

Juniper. (2008) Juniper JFlow. [link].

K. Graffi (2006) “A Security Framework for Organic Mesh Networks,” Master’s thesis, TU-Darmstadt, Maio.

Kamp, P.-H. and Watson, R. N. M. (2000). Jails: Confining the omnipotent root. In Proceedings of the Second International System Administration and Networking Conference (SANE).

Karagiannis, T., Papagiannaki, K., e Faloutsos, M. (2005) BLINC: Multilevel traffic classification in the dark. ACM SIGCOMM Computer Communication Review, 35(4), páginas 229-240. ACM Press.

Karpijoki ,V. (2001), “Security in ad hoc networks”, no “Seminar on Network Security.

Kim, J., e Bahk, S. (2008) “MeCA: Distributed Certi.cation Authority in Wireless Mesh Networks”. IEEE Communications Society subject matter experts for publication in the IEEE CCNC 2008 proceedings.

King, S. and Chen, P. (2006). Subvirt: Implementing malware with virtual machines. In IEEE Symposium on Security and Privacy, pages 1–14.

Klaus, B. (1999). From antivirus to antimalware software and beyond: Another approach to the protection of customers from dysfunctional system behaviour. In 22nd National Information Systems Security Conference. http://csrc.nist.gov/nissc/1999/proceeding/papers/p12.pdf.

Krause, M. and Tipton, H. F. (1999). Handbook of Information Security Management. Auerbach Publications.

Krebs, M., Krempels, K., Kucay, M. (2008) “Service Discovery in Wireless Mesh Networks”. IEEE Communications Society subject matter experts for publication in the WCNC 2008 proceedings.

Krebs, Martin; Krempels, Karl-Heinz; Kucay, Markus (2008) “Service Discovery in Wireless Mesh Networks”. IEEE Wireless Communications and Networking Conference (WCNC), pp. 3093 – 3098, Abril.

Krishnamurthy, B. (2006) Unwanted traffic: Important problems, research approaches. IAB Workshop. http://www.research.att.com/~bala/papers

Krishnamurthy, B., e Blackmond, E. (2003) SHRED: Spam Harassment Reduction via Economic Disincentives. White Papers. AT&T. http://www.research.att.com/~bala/papers/

Kruegel, C., Robertson, W., and Vigna, G. (2004). Detecting kernel-level rootkits through binary analysis. In 20th Annual Computer Security Applications Conference.

Kumar, S., e Spafford, E.H. (1994) An application of pattern matching in intrusion detection. The COAST Project, Department of Computer Sciences, Purdue University, West Lafayette, IN, USA, Technical Report CSD-TR- 94-013.

Kurose, James F, Ross, Keith W. (2006) “Redes de Computadores e a Internet – Uma abordagem Top-Down”. Addison Wesley. 3ª Edição.

Kwan, P. C. S. and Durfee, G. (2007). Practical uses of virtual machines for protection of sensitive user data. In Information Security Practice and Experience, pages 145–161. Springer Berlin / Heidelberg.

Kyasanur, P., So, J., Chereddi, C., Vaidya Nitin H., (2007) “Multi-Channel Mesh Networks: Challenges and Protocols”, University of Illinois at Urbana-Champaign. Disponível em <http://www.hserus.net/~cck/pubs/wcom.pdf>. Acessado em Junho de 2008.

Lakhina, A., Crovella, M., e Diot, C. (2004) Diagnosing Network-Wide Traffic Anomalies. Em ACM SIGCOMM, páginas 219-230.

Lakhina, A., Crovella, M., e Diot, C. (2005) Mining anomalies using traffic feature distributions. ACM SIGCOMM Computer Communication Review, 35(4), páginas 217-228. ACM Press.

Laufer, R., Moraes, I., Velloso, P., Bicudo, M., Campista, M., Cunha, D., Costa, L., e Duarte, O. (2005) Negação de Serviço: Ataques e Contramedidas. Livro Texto dos Mini-cursos do V Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg'2005). Florianópolis, Brasil.

Laureano, M. A. P. (2006). Máquinas Virtuais e Emuladores - Conceitos, Técnicas e Aplicações. Novatec Editora, first edition.

Laureano, M., Maziero, C., and Jamhour, E. (2004). Intrusion detection in virtual machine environments. In 30th EUROMICRO Conference, pages 520–525, Rennes - França.

Laureano, M., Maziero, C., and Jamhour, E. (2007). Protecting host-based intrusion detectors through virtual machines. Computer Networks, 51:1275–1283.

Lee, M., Zheng, J., Ko, Y. e Shrestha, D. (2006) “Emerging Standards For Wireless Mesh Technology”. IEEE Wireless Communications. Abril.

LeVasseur, J., Uhlig, V., Stoess, J., and Götz, S. (2004). Unmodified device driver reuse and improved system dependability via virtual machines. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation, San Francisco, CA.

Li, Guangsong (2007) “An Identity-Based Security Architecture for Wireless Mesh Networks”. NPC Workshops. IFIP International Conference on Network and Parallel Computing Workshops, pp. 223 - 226, Setembro.

Li, X., Bian, F., Crovella, M., Diot, C., Govindan, R., Iannaccone, G., e Lahkina, A. (2006) Detection and Identification of Network Anomalies using Sketch Subspaces. Em 6th ACM SIGCOMM on Internet Measurement Conference (IMC´06), páginas 147-152. Rio de Janeiro, Brasil. ACM Press.

Li, X., Yang, W., Moon, S., Mal, J. (2006) “Authentication Method for 802.11s Infrastructure Mode”. IEEE.

Li, Xiang-Yang; Wu, Yanwei; Wang, WeiZhao. (2007) “Stochastic Security in Wireless Mesh Networks via Saddle Routing Policy”. International Conference on Wireless Algorithms, Systems and Applications, pp. 121 – 128.

Lin C., (1997) “Dynamic key management schemes for access control in a hierarchy”, Computer Communications, Vol 20, No 15, Dezembro.

Lin, X., Lu, R., Ho, P., Shen, X., Cao, Z. (2008 “TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks”. IEEE Transactions on Wireless Communications, Vol. 7, No. 4, Abril.

Lindqvist, U. and Jonsson, E. (1998). A map of security risks associated with using cots. Computer, 31(6):60–66.

Lippmann, R. P., Fried, D. J., Graf, I., Haines, J. W., Kendall, K. R., McClung, D., Weber, D., Webster, S. E., Wyschogrod, D., Cunningham, R. K., and Zissman, M. A. (2000b). Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation. discex, 02:1012.

Lippmann, R., Haines, J.W., Fried, D. J., Korba, J., and Das, K. (2000a). The 1999 darpa off-line intrusion detection evaluation. Comput. Networks, 34(4):579–595.

Liston, T. and Skoudis, E. (2006). On the cutting edge: Thwarting virtual machine detection. In SANS Conference.

Lou, W., Fang, Y. (2004) “A Survey on Wireless Security in Mobile Ad Hoc Networks: Challenges and Possible Solutions”, edited by X. Chen, X. Huang and D.-Z. Du, Kluwer Academic Publishers/Springer.

Luiz, A., Júnior, O. (2005) “Infra-estrutura e Roteamento em Redes Wireless Mesh”, Pontifícia Universidade Católica do Paraná – PUC-PR.

Mahalanobis, P. C. (1930) On tests and measures of groups divergence. Journal of the Asiatic Society of Bengal, volume 26.

Mahmoud, A., Sameh, A.,El-Kassas, S. (2005) “Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN)”. IEEE Computer Society, pp. 258-259.

Maki S., Aura T., Hietalahti M. (2000) ”Robust membership management for ad-hoc groups.” In Proc. 5th Nordic Workshop on Secure IT Systems (NORDSEC 2000), Reykjavik, Iceland.

McHugh, J. (2000). Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur., 3(4):262–294.

Mell, P. and Grance, T. (2002). Use of the common vulnerabilities and exposures (cve) vulnerability naming scheme. NIST Special Publication 800-51.

Mell, P., Marks, D., and McLarnon, M. (2000). A denial-of-service resistant intrusion detection architecture. Comput. Networks, 34(4):641–658.

Meshdynamics Home Page (2001) “High Performance Outdoor Wireless Mesh Networking”. Disponível em <http://www.meshdynamics.com/>. Acessado em Junho de 2008.

Microsoft. (2008) Network Access Protection. http://technet.microsoft.com/en-us/network/bb545879.aspx

Mirkovic, J., Martin, J., e Reiher, P. (2004) A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms. ACM SIGCOMM Computer Communications Review, 34(2), páginas 39–53. ACM Press.

Mishra, A., NAadkami K., Patcha, A. (2004) “Intrusion detection in wireless ad hoc networks”. IEEE Wireless Communications, vol. 11. pp 48-60.

Mogre, Parag S., Graffi, Kálmán, Matthias Hollick, and Ralf Steinmetz (2007) “AntSec, WatchAnt, and AntRep: Innovative Security Mechanisms for Wireless Mesh Networks”. 32nd IEEE Conference on Local Computer Networks (LCN), pp. 539 – 547, Outubro.

Moore, D. (2002) Network Telescopes: Observing Small or Distant Security Events. Em 11th USENIX Security Symposium.

Moore, D., Shannon, C., Voelkery, G. M., e Savagey, S. (2004) Network Telescopes: Technical Report. Cooperative Association for Internet Data Analysis.CAIDA. http://www.caida.org/outreach/papers/2004/tr-2004-04

Morin, M. (2006) The Financial Impact of Attack Traffic on Broadband Networks. IEC Annual Review of Broadband Communications, páginas 11–14.

MotoMesh (2008). Disponível em [link]. Acessado em Junho de 2008.

Murthy, C. e Manoj, B. (2004) “Ad Hoc Wireless Networks: Architectures and Protocols”. 1ª Edição. USA, Prentice Hall Professional Technical Reference.

Nanda, S. and Chiueh, T. (2005). A survey on virtualization technologies. Technical report, University of New York at Stony Brook.

Naveed, A., Kanhere, S. (2006) “Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks”. IEEE Communications Society subject matter experts for publication in the IEEE GLOBECOM 2006 proceedings. Ornaghi, A., Valleri, M. (2008) “Etercap”. Disponível em <http://ettercap.sourceforge.net>. Acessado em julho de 2008.

Nethercote, N. and Seward, J. (2007). Valgrind: A framework for heavyweight dynamic binary instrumentation. In Proceedings of ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation (PLDI 2007), San Diego - California - USA.

Newman, M., Wiberg, C.-M., and Braswell, B. (2005). Server Consolidation with VMware ESX Server. IBM RedBooks. http://www.redbooks.ibm.com.

Oliveira, E. L., Aschoff, R., Lins, B., Feitosa, E., Sadok, D. (2007) Avaliação de Proteção contra Ataques de Negação de Serviço Distribuídos (DDoS) utilizando Lista de IPs Confiáveis. VII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais (VII SBSEG). Rio de Janeiro, Brasil.

OpenNet. (2004) Internet Filtering in China in 2004-2005: A County Study. http://www.opennetinitiative.net/studies/china/ONI_China_Country_Study.pdf

Ormandy, T. (2007). An empirical study into the security exposure to hosts of hostile virtualized environments. In CanSecWest, Vancouver BC.

Pang, R., Yegneswaran, V., Barford, P., Paxon, V., e Peterson, L. (2004) Characteristics of Internet Background Radiation. Em 4th ACM SIGCOMM on Internet Measurement Conference (IMC’ 04). ACM Press.

Papadimitatos, P., Haas, Z. J. (2003) “Secure link state routing for mobile ad hoc networks”. IEEE Computer Society. pp 379-383.

Parastatidis, S. and Webber, J. (2004). Assessing the risk and value of adopting emerging and unstable web services specifications. In SCC ’04: Proceedings of the 2004 IEEE International Conference on Services Computing, pages 65–72, Washington, DC, USA. IEEE Computer Society.

Paxson, V. (1998) Bro: A System for Detecting Network Intruders in Real-Time. Em 8th USENIX Security Symposium.

Perkins, C. E. (1994) “Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers”. Portal ACM, vol. 24, pp 234-244.

Popek, G. and Goldberg, R. (1974). Formal requirements for virtualizable third generation architectures. Communications of the ACM, 17(7):412– 421.

Provos, N. (2004) A Virtual Honeypot Framework. Em 13th USENIX Security Symposium.

Provos, N. (2004). A virtual honeypot framework. In 13th USENIX Security Symposium, San Diego, CA.

Provos, N. (2008) Honeyd. http://www.honeyd.org.

Ptacek, T. H. and Newsham, T. N. (1998). Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks,Inc.

Puketza, N. J., Zhang, K., Chung, M., Mukherjee, B., and Olsson, R. A. (1996). A methodology for testing intrusion detection systems. IEEE Trans. Softw. Eng., 22(10):719–729.

Radicati Group. (2006) Corporate Email Market 2006-2010. http://www.radicati.com.

Raffetseder, T., Kruegel, C., and Kirda, E. (2007). Detecting system emulators. In 10th Information Security Conference - LNCS.

Rahman, S. M. M., Inomata, A., Okamoto, T., Mambo, M., Okamoto, E. (2006) “Anonymous secure communication in wireless mobile ad-hoc networks”. Proc. 1st Intl. Conf. on Ubiquitous Convergence Technology, pp. 131–140, Dezembro.

Raya, M., Hubaux, J-P. (2007) “Securing vehicular ad hoc networks,” Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks, vol. 15, no. 1, pp. 39–68.

RFC 3561 (2003), “Ad hoc On-Demand Distance Vector (AODV) Routing”. Disponível em <http://www.ietf.org/rfc/rfc3561.txt>, visitado em julho de 2008.

RFC 3626 (2003), “Optimized Link State Routing Protocol (OLSR)”. Disponível em <http://www.ietf.org/rfc/rfc3626.txt>, visitado em julho de 2008.

Ricciato, F. (2006) Unwanted traffic in 3G networks. ACM SIGCOMM Computer Communications Review, 36(2), páginas 53 – 51. ACM Press.

Ricciato, F., Hasenleithner, E., Svoboda, P., and Fleischer, W. (2006) On the impact of unwanted traffic onto a 3G network. Em Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006).

Richardson, R. (2007) CSI/FBI Computer Crime Survey. Em Twelfth Annual Computer Crime and Security, páginas 1-30.

Robin, J. and Irvine, C. (2000). Analysis of the Intel Pentium’s ability to support a secure virtual machine monitor. In 9th USENIX Security Symposium.

Rosenblum, M. (2004). The reincarnation of virtual machines. Queue Focus - ACM Press, pages 34–40.

Rosenblum, M. and Garfinkel, T. (2005). Virtual machine monitors: current tecnology and future trends. IEEE Computer Magazine, 38(5):39–47.

Ross, R., Katzke, S., Johnson, A., Swanson, M., Stoneburner, G., Rogers, G., and Lee, A. (2005). Recommended security controls for federal information systems. NIST Special Publication 800-53.

Royer, E., Toh, C. (1999) “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”. IEEE Personal Communications, pp. 46 – 55, Abril.

Rutkowska, J. (2004). Red pill... or how to detect VMM using (almost) one CPU instruction. http://invisiblethings.org/papers/redpill.html.

Rutkowska, J. (2006). Subverting Vista kernel for fun and profit. http://www.blackhat.com. Black Hat USA 2006.

S. Murthy and J. J. Garcia-Luna-Aceves (1996) “An Efficient Routing Protocol for Wireless Networks”. ACM Mobile Networks and App. J., Special Issue on Routing in Mobile Communication Networks, pp. 183–97, Outubro.

S. Seys and B. Preneel, (2006) “ARM: Anonymous routing protocol for mobile ad hoc networks”. Proc. 20th Int’l Conf. on Advanced Information Networking and Applications (AINA), pp. 133–137, Abril.

Salem, B. N.; Hubaux, J.-P.; (2006) “Securing Wreless Mesh Networks”. IEEE Wirelesss Communications. Abril.

Salem, N. B. and Hubaux, J-P. (2006) “Securing Wireless Mesh Networks”, in IEEE Wireless Communication, Vol 13, Issue 2, pp. 50 – 55, Abril.

Scherrer, A., Larrieu, N., Borgnat, P., Owezarski, P., e Abry, P. (2006) Non Gaussian and Long Memory Statistical Modeling of Internet Traffic. Em 4th International Workshop on Internet Performance, Simulation, Monitoring and Measurement (IPS-MoMe).

Scherrer, A., Larrieu, N., Owezarski, P., Borgnat, P., e Abry, P. (2007) Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies. IEEE Transactions on Dependable and Secure Computing, volume 4, páginas 56-70.

Schulze, H. e Mochalski, K. (2007) Internet Study 2007. Ipoque. http://www.ipoque.com/userfiles/file/internet_study_2007.pdf

Sêmola, M. (2003). Gestão da Segurança da Informação - Uma visão executiva. Campus, Rio de Janeiro.

Seward, J. and Nethercote, N. (2005). Using Valgrind to detect undefined value errors with bit-precision. In USENIX Annual Technical Conference.

Siddiqui, M. S., Amin, S. O., Hong, C. S., (2008) “An Efficient Mechanism for Network Management in Wireless Mesh Network”. 10th International Conference on Advanced Communication Technology (ICACT), Vol 1, pp. 301 – 305, Fevereiro.

Siddiqui, M. S., Amin, S. O., Kim, J., Hong, C., (2007) “MHRP: A secure multi-path hybrid routing protocol for wireless mesh network”

Siddiqui, M. S., Hong, C. S. (2007) “Security Issues in Wireless Mesh Networks”. International Conference on Multimedia and Ubiquitous Engineering (MUE), pp. 717 – 722, Abril.

Sivakumar, R., Sinha, P. e Bharghavan, V. (1998) "Core extraction distributed ad hoc routing (CEDAR) specification". Internet-Draft, draft-ietf-manetzone-cedar-00.txt. Outubro.

Skoudis, E. and Zeltser, L. (2003). Malware: Fighting Malicious Code. Prentice Hall PTR.

Smith, J. and Nair, R. (2004). Virtual Machines: Architectures, Implementations and Applications. Morgan Kaufmann.

Smith, J. E. and Nair, R. (2005). The architecture of virtual machines. IEEE Computer, pages 32–38.

Snort. (2008) Snort IDS. http://www.snort.org.

Song, R., Korba, L., Yee, G. (2005) “AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks”. Portal ACM. pp 33-42.

Soto, P. (2005) Identifying and Modeling Unwanted Traffic on the Internet. Dissertação de Mestrador. Departamento de Engenharia Elétrica e Ciência da Computação, Massachusetts Institute of Technology (MIT).

Spitzner, L. (2002) Honeypots: Tracking Hackers. Addison-Wesley Professional.

Stallings W., (1998) “Snmp, SnmpV2, Snmpv3, Rmon 1 e 2”. Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA

StillSecure. (2008) Safe Access – Network access control solution. http://www.stillsecure.com/safeaccess.

Stoneburner, G., Goguen, A., and Feringa, A. (2002). Risk management guide for information technology systems. NIST Special Publication 800-30.

Sugerman, J., Venkitachalam, G., and Lim, B. H. (2001). Virtualizing I/O devices on VMware workstation’s hosted virtual machine monitor. In Proceedings of the 2001 USENIX Annual Technical Conference, pages 1–14.

Sun, J., Zhang, C., Fang, Y. (2008) “A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks”. IEEE INFOCOM 2008.

Swanson, M. and Guttman, B. (1996). Generally accepted principles and practices for securing information technology systems. NIST Special Publication 800-14.

Takeda, S., Yagyu, K., Aoki, H., Matsumoto, Y. (2005) “Multi-Interface Oriented Radio Metric On-Demand Routing Protocol for Layer-2 Mesh Network”. IEICE Technical Report RCS2005-59, Julho.

Tamashiro, C. (2007) “Uma Análise de Protocolos de Roteamento Anônimo para Redes Sem Fio Ad Hoc Móveis”. Dissertação de Mestrado, instituição Universidade Federal de Santa Catarina – UFSC.

Tan, L., Chan, E. M., Farivar, R., Mallick, N., Carlyle, J. C., David, F. M., and Campbell, R. H. (2007). iKernel: Isolating buggy and malicious device drivers using hardware virtualization support. In Third IEEE International Symposium on Dependable, Autonomic and Secure Computing, pages 134–144.

Taveira, D., Moraes, I., Rubinstein, M. e Duarte, O. (2006) Técnicas de Defesa Contra Spam. Livro Texto dos Mini-cursos do VI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg'2006). Santos, Brasil.

The Honeynet Project. (2006) Know Your Enemy: Honeynets. http://www.honeynet.org/papers/honeynet/index.html.

Tropos Home Page (2008) “ Wireless Broadband You Control”. Disponível em <http://www.tropos.com/>. Acessado em Junho de 2008.

Uhlig, R., Neiger, G., Rodgers, D., Santoni, A., Anderson, F. M. A., Bennett, S., Kägi, A., Leung, F., and Smith, L. (2005). Intel virtualization technology. IEEE Computer.

Ung, D. and Cifuentes, C. (2006). Dynamic re-engineering of binary code with run-time feedbacks. Science of Computer Programming, 60(2):189– 204.

US Department of Homeland Security (2002). Federal Information Security Management Act of 2002, H.R. 2458-48. (Public Law 107-347).

USENIX. (2005) International Workshop on Steps to Reducing Unwanted Traffic on the Internet. http://www.usenix.org/events/sruti05/

VirtualBox, I. (2008). The VirtualBox architecture. http://www.virtualbox.org/wiki/VirtualBox_architecture.

VMware (2000). VMware technical white paper. Technical report, VMware, Palo Alto, CA - USA.

W3C (2004). Web Services Architecture. W3C Working Group Note 11.

Wang, H., Huang, J. Z., Qu, Y., and Xie, J. (2004). Web services: problems and future directions. Journal of Web Semantics, 1(3):309–320.

Weaver, N., Paxson, V., Staniford, S., e Cunningham. R. (2003) A Taxonomy of Computer Worms. Em ACM Workshop on Rapid Malcode.

Whitaker, A., Shaw, M., and Gribble, S. (2002). A scalable isolation kernel. In Proceedings of the Tenth ACM SIGOPS European Workshop, Saint Emilion - France.

Willems, C., Holz, T., and Freiling, F. (2007). Toward automated dynamic malware analysis using CWSandbox. IEEE Security and Privacy, 5(2):32– 39.

Wu, M., Miller, R.C., Little, G. (2006) Web Wallet: Preventing Phishing Attacks by Revealing User Intentions. Em Symposium On Usable Privacy and Security (SOUPS), páginas 102-113.

Xian, Y., Huang, C. (2007) “Securing VoIP Services in Multi-Hop Wireless Mesh Networks”. IEEE ISWCS.

Xiang, G., Min, W., e Rongchun, Z. (2006) Application of Fuzzy ART for Unsupervised Anomaly Detection System. Em International Conference on Computational Intelligence and Security, volume 1, páginas 621-624.

Xiao, Yang (2008) “Accountability for Wireless LANs, Ad Hoc Networks, and Wireless Mesh Networks”. IEEE Communications Magazine, pp 116 a 126, Abril.

Xu, K., Zhang, Z-L., e Bhattacharrya, S. (2005) Profiling internet backbone traffic: Behavior models and applications. ACM SIGCOMM Computer Communication Review, 35(4), páginas 169-180. ACM Press.

Xu, K., Zhang, Z-L., e Bhattacharrya, S. (2005) Reducing unwanted traffic in a backbone Network. Em International Workshop on Steps of Reducing Unwanted Traffic on the Internet (SRUTI'05).

Xue, Q., Ganz, A. (2005) “QoS routing for Mesh-based Wireless LANs”, Department of Electrical and Computer Engineering - University of Massachusetts. Disponível em [link]. Acessado em Junho de 2008.

Yegneswaran, V., Barford, P., and Jha, S. (2004). Global intrusion detection in the DOMINO overlay system. In NDSS, San Diego, California, USA. The Internet Society.

Yen, C.-H. (2007). Solaris operating system - hardware virtualization product architecture. Technical Report 820-3703-10, Sun Microsystems.

Yu, D. and Frincke, D. (2004). Towards survivable intrusion detection system. hicss, 09:90299a.

Yu, W. D., Supthaweesuk, P., and Aravind, D. (2005). Trustworthy web services based on testing. sose, 0:167–177.

Zapata, M. G. (2002) “Secure ad hoc on-demand distance vector routing”. Portal ACM. vol. 6. pp. 106-107.

Zhang, Y., Fang, Y. (2006) “ARSA: An attack-resilient security architecture for multihop wireless mesh networks,” IEEE J. Select. Areas Communications, vol. 24, no. 10, pp. 1916–1928, Outubro.

Zhang, Z., Nait-Abdesselam, F., Ho, P., Lin, X. (2008) “RADAR: a ReputAtion-based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks”. IEEE Communications Society subject matter experts for publication in the WCNC 2008 proceedings.

Zheng, X., Chen, C., Huang, C., Matthews, M., Santhapuri, N. (2004) “A Dual Authentication Protocol for IEEE 802.11 Wireless LANs”. Disponível em <http://www.cse.sc.edu/~huangct/iswcs05cr.pdf>. Acessado em Junho de 2008.

Zhi-tang, L., Yao, L., e Li, W. (2005) A Novel Fuzzy Anomaly Detection Algorithm Based on Artificial Immune System. Em 8th International Conference on High-Performance Computing in Asia-Pacific Region (HPCASIA’05), páginas 479-483.

Zhou, L, Haas, Z. J. (1999) “Securing ad hoc networks,” IEEE Network Magazine, vol. 13, no. 6, pp. 24–30, Dezembro.

Zhu, H., Lin, X., Lu, R, Ho, P., Shen, X. (2007) “Secure Localized Authentication and Billing for Wireless Mesh Networks”. IEEE Communications Society subject matter experts for publication in the IEEE GLOBECOM 2007 proceedings.

Zovi, D. A. D. (2006). Hardware virtualization based rootkits. http://www.blackhat.com. Black Hat USA 2006.

Capa para Minicursos do VIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais
Data de publicação
01/09/2008

Detalhes sobre o formato disponível para publicação: Volume Completo

Volume Completo
ISBN-13 (15)
978-85-7669-191-4