{"id":4925,"date":"2020-08-01T22:57:54","date_gmt":"2020-08-01T14:57:54","guid":{"rendered":"https:\/\/ixyzero.com\/blog\/?p=4925"},"modified":"2020-08-01T22:57:54","modified_gmt":"2020-08-01T14:57:54","slug":"read%e5%a4%a7%e5%9e%8b%e4%ba%92%e8%81%94%e7%bd%91%e4%bc%81%e4%b8%9a%e5%ae%89%e5%85%a8%e6%9e%b6%e6%9e%84","status":"publish","type":"post","link":"https:\/\/ixyzero.com\/blog\/archives\/4925.html","title":{"rendered":"[read]\u5927\u578b\u4e92\u8054\u7f51\u4f01\u4e1a\u5b89\u5168\u67b6\u6784"},"content":{"rendered":"\n<p>=Start=<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u7f18\u7531\uff1a<\/h4>\n\n\n\n<p>\u6574\u7406\u8bb0\u5f55\u4e00\u4e0b\u6700\u8fd1\u5728\u770b\u7684\u300a\u5927\u578b\u4e92\u8054\u7f51\u4f01\u4e1a\u5b89\u5168\u67b6\u6784\u300b\u4e00\u4e66\uff0c\u65b9\u4fbf\u540e\u7eed\u53c2\u8003\u5b66\u4e60\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u6b63\u6587\uff1a<\/h4>\n\n\n\n<h5 class=\"wp-block-heading\">\u53c2\u8003\u89e3\u7b54\uff1a<\/h5>\n\n\n\n<p>\u6574\u4f53\u6765\u8bf4\uff0c\u5168\u4e66\u7684\u524d8\u7ae0\u5185\u5bb9\u4e0d\u9519\uff08\u7bc7\u5e45\u5360\u4e86\u5168\u4e66\u768477%\u5de6\u53f3\uff09\uff0c\u5c24\u5176\u662f\u6d89\u53ca\u5230&#8221;\u4e3b\u673a\u5b89\u5168&#8221;\u76f8\u5173\u7684\u5185\u5bb9\uff08\u53ef\u80fd\u548c\u4f5c\u8005\u8fd120\u5e74\u7684\u4fe1\u606f\u5b89\u5168\u4ece\u4e1a\u7ecf\u9a8c\u6709\u5173\uff0c\u5c31\u6211\u9047\u5230\u8fc7\u7684\u6765\u8bf4\uff0c\u6700\u65e9\u4e00\u6279\u7684\u5b89\u5168\u5927\u4f6c\u5e95\u5c42\u57fa\u7840\u77e5\u8bc6\u90fd\u5f88\u624e\u5b9e\uff09\uff0c\u5176\u6b21\u5c31\u662f&#8221;\u53c2\u8003\u8d44\u6599&#8221;\u8fd9\u4e00\u90e8\u5206\uff08\u5e94\u8be5\u548c\u4f5c\u8005\u7684\u5b89\u5168\u89c6\u91ce\uff0c\u4ee5\u53ca\u5f88\u5f3a\u7684\u5f00\u53d1\u80fd\u529b\u548c\u7ecf\u9a8c\u6709\u5173\uff09\u3002<\/p>\n\n\n\n<p>\u4e0b\u9762\u6574\u7406\u4e00\u4e0b\u8be5\u4e66\u7684\u76ee\u5f55\u7ed3\u6784\uff0c\u8ddf\u7740\u4f5c\u8005\u7684\u601d\u8def\u634b\u4e00\u4e0b\u5927\u578b\u4e92\u8054\u7f51\u4f01\u4e1a\u7684\u5b89\u5168\u67b6\u6784\u548c\u5efa\u8bbe\u8def\u5f84\uff1a<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u7b2c\u4e00\u90e8\u5206 \u5b89\u5168\u7406\u8bba\u4f53\u7cfb<\/h4>\n\n\n\n<p>security philosophy<br>security architecture theory<br>security construction guideline<\/p>\n\n\n\n<p style=\"color:#a30005\" class=\"has-text-color\">\u4e0d\u540c\u7684\u516c\u53f8\u5bf9\u5b89\u5168\u7406\u5ff5\u6709\u4e0d\u540c\u7684\u7406\u89e3\u3002\u963f\u91cc\u4e91\u76841+3\u5b89\u5168\u8fd0\u8425\u7ba1\u63a7\u7406\u5ff5\uff0c\u5373\u901a\u8fc7\u201c<strong>\u5b89\u5168\u878d\u5165\u8bbe\u8ba1\u3001\u81ea\u52a8\u5316\u76d1\u63a7\u4e0e\u54cd\u5e94\u3001\u7ea2\u84dd\u5bf9\u6297\u4e0e\u6301\u7eed\u6539\u8fdb<\/strong>\u201d\u8fd93\u4e2a\u5b89\u5168\u624b\u6bb5\uff0c\u5b9e\u73b0\u4fdd\u969c\u7528\u6237\u6570\u636e\u5b89\u5168\u8fd9\u4e2a\u6838\u5fc3\u76ee\u6807\u3002<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u201c\u4ee5<strong>\u5b89\u5168\u6587\u5316\u5efa\u8bbe<\/strong>\u4e3a\u4e2d\u5fc3\uff0c\u5c06\u5b89\u5168\u878d\u4e8e\u4f53\u7cfb\uff0c\u5efa\u7acb\u81ea\u52a8\u5316\u76d1\u63a7\u4e0e\u54cd\u5e94\u7cfb\u7edf\uff0c\u6301\u7eed\u8fdb\u884c\u653b\u9632\u5bf9\u6297\u4e0e\u5b89\u5168\u521b\u65b0\u201d\u7684\u65b0\u5b89\u5168\u5efa\u8bbe\u7406\u5ff5\u3002<\/p><\/blockquote>\n\n\n\n<h5 class=\"wp-block-heading\">\u7b2c1\u7ae0 \u5b89\u5168\u7406\u5ff5<\/h5>\n\n\n\n<p>1.1 \u5b89\u5168\u7ec4\u7ec7\u4e0e\u6807\u51c6<br><strong>1.2 \u4f01\u4e1a\u5b89\u5168\u98ce\u9669\u7efc\u8ff0<br><\/strong>1.2.1 \u4e1a\u52a1\u4e0e\u8fd0\u7ef4\u5b89\u5168<br>1.2.2 \u4f01\u4e1a\u5185\u90e8\u5b89\u5168<br>1.2.3 \u6cd5\u5f8b\u6cd5\u89c4\u4e0e\u9690\u79c1\u4fdd\u62a4<br>1.2.4 \u4f9b\u5e94\u94fe\u5b89\u5168<br><strong>1.3 \u4e1a\u754c\u7406\u5ff5\u6700\u4f73\u5b9e\u8df5<\/strong><\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u7b2c2\u7ae0 \u56fd\u9645\u8457\u540d\u5b89\u5168\u67b6\u6784\u7406\u8bba<\/h5>\n\n\n\n<p style=\"color:#a3000a\" class=\"has-text-color\"><strong>2.1 P2DR\u6a21\u578b<br>2.2 IPDRR\u6a21\u578b<br><\/strong>2.3 IATF<br>2.4 CGS\u6846\u67b6<br><strong>2.5 \u81ea\u9002\u5e94\u5b89\u5168\u67b6\u6784<br><\/strong>2.6 IACD<br><strong>2.7 \u7f51\u7edc\u97e7\u6027\u67b6\u6784<br><\/strong>2.8 \u603b\u7ed3<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u7b2c3\u7ae0 \u5927\u578b\u5b89\u5168\u4f53\u7cfb\u5efa\u8bbe\u6307\u5357<\/h5>\n\n\n\n<p>3.1 \u5feb\u901f\u6cbb\u7406\u9636\u6bb5<br><strong>3.1.1 \u9009\u62e9\u5408\u9002\u7684\u5b89\u5168\u8d1f\u8d23\u4eba<br>3.1.2 \u8bc6\u522b\u4e3b\u8981\u7684\u5b89\u5168\u98ce\u9669<br>3.1.3 \u5b9e\u65bd\u5feb\u901f\u6d88\u51cf\u7b56\u7565<br><\/strong>3.2 \u7cfb\u7edf\u5316\u5efa\u8bbe\u9636\u6bb5<br><strong>3.2.1 \u4f9d\u636eISMS\u5efa\u7acb<em>\u5b89\u5168\u7ba1\u7406<\/em>\u4f53\u7cfb<br>3.2.2 \u57fa\u4e8eBSIMM\u6784\u5efa<em>\u5b89\u5168\u5de5\u7a0b<\/em>\u7684\u80fd\u529b<br>3.2.3 \u53c2\u8003Google\u4e91\u5e73\u53f0\u8bbe\u8ba1<em>\u5b89\u5168\u6280\u672f\u4f53\u7cfb<\/em><br><\/strong>3.3 \u5168\u9762\u5b8c\u5584\u4e0e\u4e1a\u754c\u534f\u540c\u9636\u6bb5<br><strong>3.3.1 \u5f3a\u5316<em>\u5b89\u5168\u6587\u5316\u5efa\u8bbe<\/em><br>3.3.2 \u5b8c\u5584\u5b89\u5168\u97e7\u6027\u67b6\u6784<br>3.3.3 \u5efa\u7acb\u534f\u540c\u5b89\u5168\u751f\u6001<\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u7b2c\u4e8c\u90e8\u5206 \u57fa\u7840\u5b89\u5168\u8fd0\u8425\u5e73\u53f0<\/h4>\n\n\n\n<p>Threat Intelligence<br>Vulnerability Detection<br>Intrusion Detection<br>Active Defense<br>Anti Backdoor<br>Security Baseline (CIS Benchmark)<br>Security Platform All in One<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u7b2c4\u7ae0 \u5a01\u80c1\u60c5\u62a5<\/h5>\n\n\n\n<p>4.1 \u516c\u5171\u60c5\u62a5\u5e93<br>4.2 \u6f0f\u6d1e\u9884\u8b66<br>4.3 \u4fe1\u606f\u6cc4\u9732<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u7b2c5\u7ae0 \u6f0f\u6d1e\u68c0\u6d4b<\/h5>\n\n\n\n<p>5.1 \u7f51\u7edc\u6f0f\u6d1e<br>5.2 \u4e3b\u673a\u6f0f\u6d1e<br>5.3 \u7f51\u7ad9\u6f0f\u6d1e<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u7b2c6\u7ae0 \u5165\u4fb5\u611f\u77e5<\/h5>\n\n\n\n<p style=\"color:#a3000a\" class=\"has-text-color\">6.1 \u7f51\u7edc\u6d41\u91cf\u5206\u6790\uff08NTA\uff09<br>6.2 \u4e3b\u673a\u5165\u4fb5\u68c0\u6d4b\uff08HIDS\uff09<br>6.3 \u6b3a\u9a97\uff08Deception\uff09\u6280\u672f<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u7b2c7\u7ae0 \u4e3b\u52a8\u9632\u5fa1<\/h5>\n\n\n\n<p>7.1 \u4e3b\u673a\u5165\u4fb5\u9632\u5fa1\uff08HIPS\uff09<br>7.2 Web\u5e94\u7528\u9632\u706b\u5899\uff08WAF\uff09<br>7.3 \u8fd0\u884c\u65f6\u5e94\u7528\u81ea\u4fdd\u62a4\uff08RASP\uff09<br>7.4 \u6570\u636e\u5e93\u9632\u706b\u5899\uff08DBF\uff09<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u7b2c8\u7ae0 \u540e\u95e8\u67e5\u6740\uff08AV\uff09<\/h5>\n\n\n\n<p style=\"color:#a30003\" class=\"has-text-color\">8.1 Rootkit<br>8.2 \u4e3b\u673a\u540e\u95e8<br>8.3 Webshell<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u7b2c9\u7ae0 \u5b89\u5168\u57fa\u7ebf<\/h5>\n\n\n\n<h5 class=\"wp-block-heading\">\u7b2c10\u7ae0 \u5b89\u5168\u5927\u8111<\/h5>\n\n\n\n<p>10.1 \u5b89\u5168\u6001\u52bf\u611f\u77e5\uff08Security Situation Awareness, SSA\uff09<br>10.2 \u5b89\u5168\u4fe1\u606f\u548c\u4e8b\u4ef6\u7ba1\u7406\uff08Security Information Event Management, SIEM\uff09<br>10.3 \u5b89\u5168\u7f16\u6392\u4e0e\u81ea\u52a8\u5316\u54cd\u5e94\uff08Security\u00a0Orchestration Automation and Response, SOAR\uff09<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u7b2c\u4e09\u90e8\u5206 \u7efc\u5408\u5b89\u5168\u6280\u672f<\/h4>\n\n\n\n<p>SDL\/DevSecOps<br>IT Security<br>Business Security<br>Cloud Security<br>Frontier Security Technology(AI &amp; Cryptography)<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u7b2c11\u7ae0 \u5b89\u5168\u5f00\u53d1\u751f\u547d\u5468\u671f<\/h5>\n\n\n\n<p>11.1 \u8ba1\u5212\u9636\u6bb5<br>11.2 \u7f16\u7801\u9636\u6bb5<br>11.3 \u6d4b\u8bd5\u9636\u6bb5<br>11.3.1 \u81ea\u52a8\u5316\u5b89\u5168\u6d4b\u8bd5<br>11.3.2 \u4eba\u5de5\u5b89\u5168\u6d4b\u8bd5<br>11.4 \u90e8\u7f72\u9636\u6bb5<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u7b2c12\u7ae0 \u4f01\u4e1a\u529e\u516c\u5b89\u5168<\/h5>\n\n\n\n<p>12.1 \u4eba\u5458\u7ba1\u7406<br>12.2 \u7ec8\u7aef\u8bbe\u5907<br>12.3 \u529e\u516c\u670d\u52a1<br>12.4 \u5b9e\u4f53\u573a\u5730<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u7b2c13\u7ae0 \u4e92\u8054\u7f51\u4e1a\u52a1\u5b89\u5168<\/h5>\n\n\n\n<p>13.1 \u4e1a\u52a1\u98ce\u63a7<br>13.2 \u6570\u636e\u5b89\u5168\u4e0e\u9690\u79c1<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u7b2c14\u7ae0 \u5168\u6808\u4e91\u5b89\u5168<\/h5>\n\n\n\n<p>14.1 \u53ef\u4fe1\u8ba1\u7b97<br>14.2 \u5185\u6838\u70ed\u8865\u4e01\uff08KLP\uff09<br>14.3 \u865a\u62df\u5316\u5b89\u5168\uff08VMS\uff09<br>14.4 \u5bb9\u5668\u5b89\u5168\uff08CS\uff09<br>14.5 \u5b89\u5168\u6c99\u76d2\uff08Sandbox\uff09<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u7b2c15\u7ae0 \u524d\u6cbf\u5b89\u5168\u6280\u672f<\/h5>\n\n\n\n<p>15.1 AI\u4e0e\u5b89\u5168<br>15.1.1 AI\u6280\u672f\u5728\u5b89\u5168\u9886\u57df\u4e2d\u7684\u5e94\u7528<br>15.1.2 AI\u6280\u672f\u81ea\u8eab\u7684\u5b89\u5168\u6027<br>15.2 \u5176\u4ed6\u6280\u672f<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h5 class=\"wp-block-heading\">\u4e66\u4e2d\u7684\u53c2\u8003\u8d44\u6599\uff08\u94fe\u63a5\uff09\uff1a<\/h5>\n\n\n\n<p>[1] https:\/\/www.iso.org\/isoiec-27001-information-security.html<br>[2] http:\/\/www.djbh.net\/webdev\/web\/PolicyStandardsAction.do?p=getListZcbzJcbz<br>[3] https:\/\/cloudsecurityalliance.org\/star\/certification\/<br>[4] https:\/\/www.pcisecuritystandards.org\/document_library?category=pcidss&amp;document=pci_dss<br>[5] https:\/\/www.eugdpr.org\/<br>[6] http:\/\/www.visualcapitalist.com\/worlds-biggest-data-breaches\/<br>[7] https:\/\/www.nds.rub.de\/media\/ei\/veroeffentlichungen\/2017\/01\/30\/printer-security.pdf<br>[8] http:\/\/mtc.baidu.com\/site\/app<br>[9] http:\/\/dev.360.cn\/html\/vulscan\/scanning.html<br>[10] https:\/\/service.security.tencent.com\/kingkong<br>[11] https:\/\/www.owasp.org\/index.php\/OWASP_Mobile_Security_Testing_Guide<br>[12] https:\/\/github.com\/MobSF\/Mobile-Security-Framework-MobSF<br>[13] https:\/\/wiki.sei.cmu.edu\/confluence\/display\/android\/Android+Secure+Coding+Standard<br>[14] https:\/\/developer.apple.com\/library\/archive\/documentation\/Security\/Conceptual\/SecureCodingGuide\/Introduction.html<br>[15] https:\/\/www.bsimm.com\/<br>[16] https:\/\/www.opensamm.org\/<br>[17] http:\/\/www.sse-cmm.org\/<br>[18] https:\/\/ai.google\/research\/pubs?area=SecurityPrivacyandAbusePrevention<br>[19] https:\/\/www.google.com\/about\/appsecurity\/tools\/<br>[20] https:\/\/ai.google\/research\/pubs\/pub43231<br>[21] https:\/\/cloud.google.com\/blog\/products\/gcp\/titan-in-depth-security-in-plaintext<br>[22] https:\/\/github.com\/opencomputeproject\/Project_Olympus\/tree\/master\/Project_Cerberus<br>[23] https:\/\/cloud.google.com\/armor\/<br>[24] https:\/\/landing.google.com\/sre\/sre-book\/chapters\/production-environment\/<br>[25] https:\/\/cloud.google.com\/security\/encryption-in-transit\/application-layer-transport-security\/<br>[26] https:\/\/cloud.google.com\/security\/encryption-in-transit\/<br>[27] https:\/\/molo.ch\/<br>[28] https:\/\/redborder.com\/<br>[29] https:\/\/github.com\/thinkst\/<br>[30] https:\/\/cloud.google.com\/shielded-vm\/<br>[31] https:\/\/cloud.google.com\/container-optimized-os\/<br>[32] https:\/\/github.com\/google\/gvisor<br>[33] https:\/\/osquery.io\/<br>[34] https:\/\/cloud.google.com\/security-scanner\/<br>[35] https:\/\/cloud.google.com\/apigee-sense\/<br>[36] https:\/\/rasp.baidu.com\/<br>[37] https:\/\/cloud.google.com\/vision\/<br>[38] https:\/\/cloud.google.com\/video-intelligence\/<br>[39] https:\/\/cloud.google.com\/iam\/<br>[40] https:\/\/cloud.google.com\/iap\/<br>[41] https:\/\/cloud.google.com\/resource-manager\/<br>[42] https:\/\/cloud.google.com\/security-key\/<br>[43] https:\/\/www.gluu.org\/<br>[44] https:\/\/cloud.google.com\/kms\/<br>[45] https:\/\/cloud.google.com\/hsm\/<br>[46] https:\/\/cloud.google.com\/dlp\/<br>[47] http:\/\/ranger.apache.org\/<br>[48] http:\/\/eagle.apache.org\/<br>[49] https:\/\/www.vaultproject.io\/<br>[50] https:\/\/cloud.google.com\/logging\/<br>[51] https:\/\/cloud.google.com\/security-command-center\/<br>[52] https:\/\/forsetisecurity.org\/<br>[53] https:\/\/cloud.google.com\/beyondcorp\/<br>[54] https:\/\/github.com\/mozilla\/MozDef<br>[55] https:\/\/abc.xyz\/investor\/other\/google-code-of-conduct.html<br>[56] https:\/\/osintframework.com\/<br>[57] https:\/\/www.virustotal.com\/<br>[58] https:\/\/developers.facebook.com\/programs\/threatexchange\/<br>[59] http:\/\/nelab-bdst.org.cn\/index.php?g=portal&amp;m=list&amp;a=index&amp;id=35<br>[60] https:\/\/x.threatbook.cn\/<br>[61] https:\/\/oases.io\/<br>[62] https:\/\/osintframework.com\/<br>[63] https:\/\/mitre.github.io\/attack-navigator\/enterprise\/<br>[64] https:\/\/github.com\/michenriksen\/gitrob<br>[65] https:\/\/github.com\/MiSecurity\/x-patrol<br>[66] https:\/\/github.com\/s-rah\/onionscan\/<br>[67] https:\/\/github.com\/CIRCL\/AIL-framework<br>[68] https:\/\/github.com\/archerysec\/archerysec<br>[69] http:\/\/www.openvas.org\/<br>[70] https:\/\/github.com\/greenbone\/<br>[71] https:\/\/github.com\/greenbone\/openvas-scanner<br>[72] https:\/\/www.greenbone.net\/en\/install_use_gce\/<br>[73] https:\/\/secinfo.greenbone.net\/omp?cmd=get_info&amp;info_type=nvt&amp;token=guest<br>[74] http:\/\/dl.greenbone.net\/community-nvt-feed-current.tar.bz2<br>[75] https:\/\/www.open-scap.org\/<br>[76] https:\/\/github.com\/OpenSCAP\/scap-workbench<br>[77] https:\/\/github.com\/OpenSCAP\/openscap-daemon<br>[78] https:\/\/github.com\/sjvermeu\/cvechecker<br>[79] https:\/\/github.com\/clearlinux\/cve-check-tool<br>[80] https:\/\/github.com\/jeremylong\/DependencyCheck<br>[81] https:\/\/github.com\/retirejs\/retire.js\/<br>[82] https:\/\/github.com\/coreos\/clair<br>[83] https:\/\/github.com\/Arachni\/arachni<br>[84] https:\/\/htcap.org\/<br>[85] https:\/\/github.com\/fcavallarin\/htcap\/archive\/1.1.0.tar.gz<br>[86] https:\/\/github.com\/yahoo\/gryffin<br>[87] https:\/\/github.com\/ring04h\/papers\/<br>[88] https:\/\/github.com\/snort3\/snort3<br>[89] https:\/\/github.com\/OISF\/suricata<br>[90] https:\/\/github.com\/bro<br>[91] http:\/\/www.haka-security.org\/<br>[92] https:\/\/github.com\/haka-security\/haka<br>[93] http:\/\/spot.incubator.apache.org\/<br>[94] https:\/\/stream4flow.ics.muni.cz\/<br>[95] https:\/\/github.com\/CSIRT-MU\/Stream4Flow\/<br>[96] https:\/\/github.com\/dreadl0ck\/netcap\/blob\/master\/mied18.pdf<br>[97] https:\/\/github.com\/dreadl0ck\/netcap<br>[98] https:\/\/github.com\/dreadl0ck\/netcap-tf-dnn<br>[99] https:\/\/github.com\/facebookincubator\/katran<br>[100] https:\/\/github.com\/iqiyi\/dpvs<br>[101] http:\/\/www.ossec.net\/<br>[102] https:\/\/github.com\/ossec\/ossec-hids<br>[103] https:\/\/docs.microsoft.com\/en-us\/sysinternals\/downloads\/sysmon<br>[104] https:\/\/github.com\/SwiftOnSecurity\/sysmon-config<br>[105] https:\/\/osquery.io\/<br>[106] https:\/\/github.com\/facebook\/osquery<br>[107] https:\/\/github.com\/palantir\/osquery-configuration<br>[108] https:\/\/github.com\/palantir\/osquery-configuration\/blob\/master\/Classic\/Servers\/Linux\/osquery.conf<br>[109] https:\/\/github.com\/kolide\/fleet<br>[110] https:\/\/github.com\/airbnb\/streamalert<br>[111] https:\/\/www.elastic.co\/cn\/solutions\/security-analytics<br>[112] https:\/\/github.com\/elastic\/beats<br>[113] https:\/\/sysdig.com\/<br>[114] https:\/\/github.com\/draios\/sysdig<br>[115] https:\/\/capsule8.com\/<br>[116] https:\/\/github.com\/capsule8\/capsule8<br>[117] https:\/\/github.com\/droberson\/exec-logger<br>[118] https:\/\/github.com\/a2o\/snoopy<br>[119] https:\/\/github.com\/leahneukirchen\/extrace<br>[120] https:\/\/lwn.net\/Articles\/157150\/<br>[121] https:\/\/github.com\/cloudfoundry\/gosigar\/blob\/master\/psnotify\/psnotify_linux.go<br>[122] https:\/\/github.com\/dbrandt\/proc_events<br>[123] https:\/\/github.com\/facebook\/osquery\/tree\/experimental\/osquery\/events\/linux<br>[124] https:\/\/github.com\/elastic\/beats\/tree\/master\/auditbeat<br>[125] https:\/\/github.com\/elastic\/go-libaudit<br>[126] https:\/\/github.com\/slackhq\/go-audit<br>[127] https:\/\/access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux\/6\/html\/security_guide\/sec-defining_audit_rules_and_controls#sec-Defining_Audit_Rules_with_the_auditctl_utility<br>[128] https:\/\/www.kernel.org\/doc\/Documentation\/trace\/tracepoints.txt<br>[129] https:\/\/github.com\/draios\/sysdig\/tree\/dev\/driver<br>[130] https:\/\/github.com\/draios\/sysdig\/blob\/dev\/driver\/main.c<br>[131] https:\/\/lwn.net\/Articles\/740157\/<br>[132] https:\/\/github.com\/draios\/sysdig\/blob\/dev\/driver\/bpf\/<br>[133] https:\/\/github.com\/draios\/sysdig\/blob\/dev\/driver\/bpf\/probe.c<br>[134] https:\/\/github.com\/draios\/sysdig\/blob\/dev\/driver\/bpf\/maps.h<br>[135] https:\/\/github.com\/torvalds\/linux\/blob\/master\/include\/linux\/bpf_types.h<br>[136] https:\/\/github.com\/iovisor\/bpftrace<br>[137] https:\/\/github.com\/capsule8\/capsule8\/blob\/master\/pkg\/sys\/perf\/monitor.go<br>[138] https:\/\/www.kernel.org\/doc\/Documentation\/trace\/kprobetrace.txt<br>[139] https:\/\/github.com\/capsule8\/capsule8\/blob\/master\/pkg\/sys\/perf\/source_linux.go<br>[140] https:\/\/github.com\/capsule8\/capsule8\/blob\/master\/pkg\/sensor\/process.go<br>[141] https:\/\/docs.aws.amazon.com\/inspector\/latest\/userguide\/inspector_agents.html<br>[142] https:\/\/s3.amazonaws.com\/aws-agent.us-east-1\/linux\/support\/AwsAgentKernelModule.tar.gz<br>[143] https:\/\/github.com\/ysrc\/yulong-hids<br>[144] https:\/\/github.com\/DianrongSecurity\/AgentSmith-HIDS<br>[145] https:\/\/github.com\/ysrc\/yulong-hids\/blob\/master\/syscall_hook\/syscall_hook.c<br>[146] https:\/\/github.com\/ysrc\/yulong-hids\/blob\/master\/syscall_hook\/syscall_stub_hook.S<br>[147] http:\/\/www.kdvelectronics.eu\/ssh-logging\/ssh-logging.html<br>[148] https:\/\/www.zhoufengjie.cn\/?p=174<br>[149] https:\/\/sourceforge.net\/projects\/ttyrpld\/<br>[150] https:\/\/github.com\/cloudposse\/sudosh<br>[151] https:\/\/github.com\/squash\/sudosh2<br>[152] https:\/\/github.com\/honeytrap\/honeytrap<br>[153] https:\/\/github.com\/thinkst\/opencanary\/<br>[154] https:\/\/github.com\/0x4D31\/honeybits<br>[155] http:\/\/canarytokens.org\/generate<br>[156] https:\/\/github.com\/thinkst\/canarytokens<br>[157] https:\/\/github.com\/libvmi\/libvmi<br>[158] https:\/\/github.com\/fireeye\/rvmi<br>[159] https:\/\/github.com\/honeytrap\/honeytrap-agent<br>[160] https:\/\/github.com\/honeytrap\/honeytrap\/blob\/master\/services\/ssh\/ssh-proxy.go<br>[161] https:\/\/github.com\/GoSecure\/pyrdp<br>[162] http:\/\/canarytokens.org\/generate<br>[163] https:\/\/github.com\/thinkst\/canarytokens\/blob\/master\/msword.py<br>[164] https:\/\/github.com\/tokesr\/honeytoken<br>[165] https:\/\/github.com\/troydo42\/CIA-Hacking-Tools\/tree\/master\/Scribbles\/<br>[166] https:\/\/github.com\/thinkst\/canarytokens\/blob\/master\/ziplib.py<br>[167] https:\/\/github.com\/thinkst\/canarytokens\/blob\/master\/sign_file.py<br>[168] http:\/\/grsecurity.net\/<br>[169] http:\/\/grsecurity.net\/features.php<br>[170] https:\/\/www.kernel.org\/doc\/html\/latest\/security\/self-protection.html<br>[171] https:\/\/wiki.ubuntu.com\/Security\/Features<br>[172] https:\/\/patchwork.kernel.org\/patch\/9965207\/<br>[173] https:\/\/www.openwall.com\/lkrg\/<br>[174] https:\/\/bitbucket.org\/Adam_pi3\/lkrg-main\/<br>[175] https:\/\/www.kernel.org\/doc\/Documentation\/kprobes.txt<br>[176] https:\/\/openwall.info\/wiki\/p_lkrg\/Main<br>[177] https:\/\/github.com\/Safe3\/clean-cow<br>[178] https:\/\/github.com\/cormander\/tpe-lkm<br>[179] https:\/\/github.com\/kkamagui\/shadow-box-for-x86<br>[180] https:\/\/github.com\/SpiderLabs\/ModSecurity<br>[181] https:\/\/github.com\/SpiderLabs\/ModSecurity-nginx<br>[182] https:\/\/github.com\/SpiderLabs\/owasp-modsecurity-crs<br>[183] https:\/\/github.com\/Flameeyes\/modsec-flameeyes<br>[184] https:\/\/github.com\/client9\/libinjection<br>[185] https:\/\/github.com\/wallarm\/libdetection<br>[186] https:\/\/wallarm.com\/<br>[187] https:\/\/github.com\/wallarm\/wallnet<br>[188] https:\/\/github.com\/facebookincubator\/katran<br>[189] https:\/\/www.iovisor.org\/technology\/xdp<br>[190] https:\/\/netdevconf.org\/2.1\/session.html?zhou<br>[191] https:\/\/github.com\/tempesta-tech\/tempesta<br>[192] https:\/\/github.com\/tempesta-tech\/tempesta\/wiki\/HTTP-cache-performance<br>[193] http:\/\/natsys-lab.blogspot.ru\/2014\/11\/the-fast-finite-state-machine-for[194] http.html<br>[195] http:\/\/natsys-lab.blogspot.ru\/2016\/10\/[196] http-strings-processing-using-csse42.html<br>[197] https:\/\/github.com\/tempesta-tech\/tempesta\/wiki\/DDoS-mitigation<br>[198] https:\/\/pan.baidu.com\/s\/13mowO<br>[199] https:\/\/github.com\/kyprizel\/testcookie-nginx-module<br>[200] http:\/\/ipset.netfilter.org\/<br>[201] http:\/\/getrepsheet.com\/<br>[202] https:\/\/github.com\/repsheet\/repsheet-nginx<br>[203] http:\/\/www.slideshare.net\/abedra\/knock-knock-24105973<br>[204] https:\/\/github.com\/SpiderLabs\/ModSecurity-nginx<br>[205] https:\/\/github.com\/SpiderLabs\/ModSecurity-apache<br>[206] https:\/\/github.com\/SpiderLabs\/ModSecurity<br>[207] https:\/\/github.com\/SpiderLabs\/ModSecurity-nginx\/blob\/master\/src\/ngx_[208] http_modsecurity_pre_access.c<br>[209] https:\/\/securitytrails.com\/<br>[210] https:\/\/0x09al.github.io\/waf\/bypass\/ssl\/2018\/07\/02\/web-application-firewall-bypass.html<br>[211] https:\/\/github.com\/LandGrey\/abuse-ssl-bypass-waf<br>[212] https:\/\/github.com\/nccgroup\/BurpSuiteHTTPSmuggler<br>[213] https:\/\/www.ietf.org\/rfc\/rfc2047.txt<br>[214] https:\/\/github.com\/php\/php-src\/blob\/master\/main\/rfc1867.c<br>[215] https:\/\/soroush.secproject.com\/downloadable\/A_Forgotten_HTTP_Invisibility_Cloak_v1.1.pdf<br>[216] https:\/\/github.com\/sqlmapproject\/sqlmap\/tree\/master\/tamper<br>[217] https:\/\/websec.ca\/kb\/sql_injection<br>[218] https:\/\/pcre.org\/pcre.txt<br>[219] https:\/\/github.com\/client9\/libinjection\/issues\/56<br>[220] https:\/\/waf.ninja\/libinjection-fuzz-to-bypass\/<br>[221] https:\/\/waf.ninja\/libinjection-different-databases-fuzzing\/<br>[222] https:\/\/waf.ninja\/review-wafninja\/<br>[223] https:\/\/dev.mysql.com\/doc\/refman\/5.5\/en\/expressions.html<br>[224] https:\/\/www.prevoty.com\/<br>[225] https:\/\/github.com\/UpstandingHackers\/hammer<br>[226] http:\/\/langsec.org\/<br>[227] https:\/\/github.com\/Geal\/nom<br>[228] https:\/\/rasp.baidu.com\/<br>[229] https:\/\/github.com\/baidu\/openrasp<br>[230] https:\/\/docs.oracle.com\/javase\/8\/docs\/platform\/jvmti\/jvmti.html<br>[231] https:\/\/docs.oracle.com\/javase\/7\/docs\/api\/java\/lang\/instrument\/Instrumentation.html<br>[232] https:\/\/docs.oracle.com\/javase\/specs\/jvms\/se7\/html\/jvms-4.html<br>[233] https:\/\/asm.ow2.io\/javadoc\/org\/objectweb\/asm\/MethodVisitor.html<br>[234] https:\/\/blogs.oracle.com\/poonam\/jvm-hang-with-cms-collector<br>[235] http:\/\/hg.openjdk.java.net\/jdk8u\/jdk8u\/hotspot\/rev\/b955bd18e8fe<br>[236] http:\/\/hg.openjdk.java.net\/jdk8u\/jdk8u\/hotspot\/rev\/2c4cecfa5ce5<br>[237] http:\/\/hg.openjdk.java.net\/jdk9\/jdk9\/hotspot\/rev\/031d1463ed4c<br>[238] http:\/\/www.phpinternalsbook.com\/<br>[239] https:\/\/github.com\/nim4\/DBShield<br>[240] https:\/\/github.com\/cossacklabs\/acra<br>[241] https:\/\/github.com\/uptimejp\/sql_firewall<br>[242] https:\/\/github.com\/mcafee\/mysql-audit<br>[243] https:\/\/github.com\/alibaba\/druid\/wiki\/%E9%85%8D%E7%BD%AE-wallfilter<br>[244] https:\/\/github.com\/Qihoo360\/mysql-sniffer<br>[245] http:\/\/nbviewer.jupyter.org\/github\/ClickSecurity\/data_hacking\/blob\/master\/sql_injection\/sql_injection.ipynb<br>[246] https:\/\/github.com\/cloudsec\/brootkit\/<br>[247] https:\/\/github.com\/ewust\/ulrk<br>[248] https:\/\/github.com\/Safe3\/godpock\/blob\/master\/Rootkit\/mafix.tar.gz<br>[249] https:\/\/packetstormsecurity.com\/files\/download\/10533\/lrk5.src.tar.gz<br>[250] https:\/\/github.com\/unix-thrust\/beurk<br>[251] https:\/\/github.com\/mempodippy\/vlany<br>[252] https:\/\/github.com\/m0nad\/Diamorphine<br>[253] https:\/\/github.com\/yaoyumeng\/adore-ng\/<br>[254] https:\/\/github.com\/jiayy\/lkm-rootkit<br>[255] https:\/\/github.com\/f0rb1dd3n\/Reptile<br>[256] https:\/\/github.com\/falk3n\/subversive<br>[257] https:\/\/github.com\/elfmaster\/kprobe_rootkit<br>[258] http:\/\/phrack.org\/issues\/58\/7.html<br>[259] http:\/\/www.phrack.org\/issues\/68\/6.html<br>[260] http:\/\/phrack.org\/issues\/68\/11.html<br>[261] https:\/\/github.com\/google\/rekall\/tree\/master\/tools\/linux\/lmap\/lmap<br>[262] https:\/\/github.com\/quarkslab\/dreamboot<br>[263] https:\/\/github.com\/ajkhoury\/UEFI-Bootkit<br>[264] https:\/\/github.com\/NextSecurity\/Gozi-MBR-rootkit<br>[265] https:\/\/github.com\/m0n0ph1\/Win64-Rovnix-VBR-Bootkit<br>[266] https:\/\/github.com\/chesteroni\/kitgen<br>[267] https:\/\/github.com\/sgxrop\/sgxrop<br>[268] https:\/\/arxiv.org\/pdf\/1902.03256.pdf<br>[269] https:\/\/lwn.net\/Articles\/682302\/<br>[270] https:\/\/www.volatilityfoundation.org\/<br>[271] https:\/\/github.com\/monnappa22\/linux_mem_diff_tool<br>[272] https:\/\/cysinfo.com\/linux-memory-diff-analysis-using-volatility-2\/<br>[273] https:\/\/gitlab.com\/nowayout\/prochunter<br>[274] https:\/\/github.com\/nbulischeck\/tyton<br>[275] https:\/\/nbulischeck.github.io\/tyton\/<br>[276] https:\/\/github.com\/dgoulet\/kjackal<br>[277] http:\/\/rkhunter.sourceforge.net\/<br>[278] http:\/\/www.chkrootkit.org\/download\/<br>[279] http:\/\/www.blackhat.com\/presentations\/bh-europe-01\/shaun-clowes\/bh-europe-01-clowes.ppt<br>[280] https:\/\/github.com\/gaffe23\/linux-inject\/<br>[281] https:\/\/www.clamav.net\/<br>[282] https:\/\/github.com\/malscan\/malscan<br>[283] https:\/\/virustotal.github.io\/yara\/<br>[284] https:\/\/binaryalert.io\/<br>[285] https:\/\/github.com\/airbnb\/binaryalert<br>[286] https:\/\/github.com\/KasperskyLab\/klara<br>[287] https:\/\/github.com\/rastrea2r\/rastrea2r<br>[288] https:\/\/github.com\/Yara-Rules\/rules<br>[289] https:\/\/github.com\/InQuest\/awesome-yara<br>[290] https:\/\/cuckoosandbox.org\/<br>[291] https:\/\/github.com\/mxmssh\/drltrace<br>[292] https:\/\/github.com\/AFAgarap\/malware-classification<br>[293] https:\/\/github.com\/ALFA-group\/robust-adv-malware-detection<br>[294] https:\/\/github.com\/surajr\/Machine-Learning-approach-for-Malware-Detection<br>[295] https:\/\/github.com\/mprhode\/malware-prediction-rnn<br>[296] https:\/\/github.com\/PUNCH-Cyber\/stoq<br>[297] https:\/\/github.com\/search?q=webshell<br>[298] https:\/\/github.com\/tennc\/webshell\/tree\/master\/fuzzdb-webshell\/servlet<br>[299] https:\/\/security.tencent.com\/index.php\/blog\/msg\/104<br>[300] https:\/\/4hou.win\/wordpress\/?p=20456<br>[301] https:\/\/github.com\/rebeyond\/memShell<br>[302] https:\/\/github.com\/nbs-system\/php-malware-finder<br>[303] https:\/\/github.com\/sfaci\/masc<br>[304] https:\/\/github.com\/hi-WenR0\/MLCheckWebshell<br>[305] https:\/\/paper.seebug.org\/526\/<br>[306] https:\/\/scanner.baidu.com\/<br>[307] https:\/\/www.cisecurity.org\/<br>[308] https:\/\/www.cisecurity.org\/cybersecurity-tools\/cis-cat-pro\/<br>[309] https:\/\/www.cisecurity.org\/cis-benchmarks\/<br>[310] https:\/\/www.cisecurity.org\/controls\/<br>[311] https:\/\/cisofy.com\/lynis\/<br>[312] https:\/\/github.com\/CISOfy\/Lynis<br>[313] https:\/\/www.inspec.io\/docs\/reference\/resources\/<br>[314] https:\/\/github.com\/slimm609\/checksec.sh<br>[315] https:\/\/www.rudder.io\/en\/<br>[316] https:\/\/aws.amazon.com\/cn\/guardduty\/<br>[317] https:\/\/www.secviz.org\/<br>[318] https:\/\/d3js.org\/<br>[319] http:\/\/visjs.org\/<br>[320] https:\/\/threejs.org\/<br>[321] https:\/\/www.babylonjs.com\/<br>[322] https:\/\/playcanvas.com\/<br>[323] https:\/\/clickhouse.yandex\/<br>[324] http:\/\/doris.incubator.apache.org\/<br>[325] https:\/\/www.graylog.org\/<br>[326] https:\/\/github.com\/Neo23x0\/sigma<br>[327] https:\/\/www.elastic.co\/cn\/products\/stack<br>[328] https:\/\/github.com\/elastic\/beats<br>[329] https:\/\/www.elastic.co\/cn\/products\/stack\/machine-learning<br>[330] https:\/\/www.splunk.com\/zh-hans_cn\/software\/user-behavior-analytics.html<br>[331] http:\/\/metron.apache.org\/<br>[332] https:\/\/github.com\/rob-med\/awesome-TS-anomaly-detection<br>[333] https:\/\/github.com\/yzhao062\/anomaly-detection-resources<br>[334] https:\/\/github.com\/hugegraph<br>[335] https:\/\/github.com\/deepmind\/graph_nets<br>[336] https:\/\/arxiv.org\/pdf\/1806.01261.pdf<br>[337] https:\/\/github.com\/phantomcyber\/playbooks<br>[338] https:\/\/github.com\/StackStorm\/st2<br>[339] https:\/\/github.com\/Patrowl\/<br>[340] https:\/\/github.com\/mozilla\/MozDef<br>[341] https:\/\/www.csa.gov.sg\/legislation\/supplementary-references<br>[342] https:\/\/continuumsecurity.net\/<br>[343] https:\/\/github.com\/continuumsecurity\/bdd-security<br>[344] http:\/\/capec.mitre.org\/data\/definitions\/3000.html<br>[345] https:\/\/github.com\/mozilla\/seasponge<br>[346] http:\/\/mozilla.github.io\/seasponge\/<br>[347] https:\/\/threatdragon.org\/<br>[348] https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=49168<br>[349] https:\/\/github.com\/google\/vsaq<br>[350] https:\/\/github.com\/OWASP\/CheatSheetSeries\/blob\/master\/Index.md<br>[351] https:\/\/www.owasp.org\/index.php\/OWASP_Secure_Coding_Practices_-<em>Quick_Reference_Guide [352] https:\/\/www.owasp.org\/images\/7\/73\/OWASP_SCP_Quick_Reference_Guide<\/em>%28Chinese%29.pdf<br>[353] http:\/\/google.github.io\/styleguide\/<br>[354] https:\/\/github.com\/alibaba\/p3c<br>[355] https:\/\/github.com\/spotbugs\/spotbugs<br>[356] https:\/\/github.com\/pumasecurity\/puma-scan<br>[357] http:\/\/cppcheck.sourceforge.net\/<br>[358] https:\/\/github.com\/fossology\/fossology<br>[359] https:\/\/github.com\/jeremylong\/DependencyCheck<br>[360] https:\/\/github.com\/snyk\/snyk<br>[361] https:\/\/github.com\/srcclr\/efda<br>[362] https:\/\/github.com\/ESAPI\/<br>[363] https:\/\/github.com\/eggjs\/egg-security<br>[364] https:\/\/eggjs.org\/zh-cn\/core\/security.html<br>[365] https:\/\/docs.spring.io\/spring-security\/site\/docs\/5.0.x\/reference\/html\/<br>[366] https:\/\/github.com\/cure53\/DOMPurify<br>[367] http:\/\/rips-scanner.sourceforge.net\/<br>[368] https:\/\/github.com\/designsecurity\/progpilot<br>[369] https:\/\/github.com\/globocom\/huskyci<br>[370] http:\/\/fb-contrib.sourceforge.net\/<br>[371] http:\/\/find-sec-bugs.github.io\/<br>[372] https:\/\/dwheeler.com\/flawfinder\/<br>[373] https:\/\/github.com\/facebook\/infer<br>[374] https:\/\/docs.sonarqube.org\/display\/PLUG<br>[375] https:\/\/www.sonarlint.org\/<br>[376] https:\/\/www.sonarqube.org\/<br>[377] https:\/\/github.com\/SonarSource\/sonarqube<br>[378] https:\/\/rules.sonarsource.com\/<br>[379] https:\/\/github.com\/michenriksen\/gitrob<br>[380] https:\/\/github.com\/flipkart-incubator\/Astra<br>[381] https:\/\/github.com\/YalcinYolalan\/WSSAT<br>[382] https:\/\/github.com\/zaproxy\/zaproxy<br>[383] https:\/\/github.com\/fuzzdb-project\/fuzzdb<br>[384] https:\/\/github.com\/linkedin\/qark<br>[385] https:\/\/appcritique.boozallen.com\/<br>[386] https:\/\/github.com\/laruence\/taint<br>[387] https:\/\/researcher.watson.ibm.com\/researcher\/files\/us-msteiner\/php.nyphp.ppt<br>[388] https:\/\/www.usenix.org\/legacy\/event\/webapps11\/tech\/final_files\/webapps11_proceedings.pdf<br>[389] https:\/\/github.com\/jpapayan\/aspis<br>[390] https:\/\/github.com\/cdaller\/security_taint_propagation<br>[391] https:\/\/www.blackhat.com\/presentations\/bh-dc-08\/Chess-West\/Presentation\/bh-dc-08-chess-west.pdf<br>[392] https:\/\/www.owasp.org\/images\/2\/2e\/OWASP_Code_Review_Guide-V1_1.pdf<br>[393] https:\/\/www.peach.tech\/products\/peach-fuzzer\/<br>[394] https:\/\/llvm.org\/devmtg\/2015-10\/slides\/SerebryanyCollingbourne-BeyondSanitizers.pdf<br>[395] https:\/\/github.com\/google\/oss-fuzz<br>[396] https:\/\/github.com\/secfigo\/Awesome-Fuzzing<br>[397] https:\/\/github.com\/octopus-platform\/joern<br>[398] http:\/\/www.mlsec.org\/joern\/docs.shtml<br>[399] https:\/\/github.com\/MobSF\/Mobile-Security-Framework-MobSF<br>[400] https:\/\/labs.mwrinfosecurity.com\/tools\/drozer\/<br>[401] https:\/\/github.com\/mwrlabs\/needle<br>[402] https:\/\/github.com\/alibaba\/iOSSecAudit<br>[403] https:\/\/github.com\/secmobi\/wiki.secmobi.com<br>[404] https:\/\/appsecwiki.com\/#\/mobilesecurity<br>[405] https:\/\/github.com\/OWASP\/owasp-mstg<br>[406] https:\/\/klee.github.io\/<br>[407] https:\/\/angr.io\/<br>[408] https:\/\/github.com\/angr\/angr<br>[409] https:\/\/github.com\/radare\/radare2<br>[410] https:\/\/github.com\/Gallopsled\/pwntools<br>[411] https:\/\/github.com\/apsdehal\/awesome-ctf<br>[412] https:\/\/github.com\/malicious0x01\/Awesome-Vulnerability-Research<br>[413] https:\/\/github.com\/nebgnahz\/awesome-iot-hacks<br>[414] https:\/\/www.owasp.org\/index.php\/OWASP_Testing_Project<br>[415] https:\/\/www.owasp.org\/images\/1\/19\/OTGv4.pdf<br>[416] https:\/\/github.com\/hashicorp\/vault<br>[417] https:\/\/www.vaultproject.io\/<br>[418] https:\/\/cn.aliyun.com\/product\/dms<br>[419] https:\/\/help.aliyun.com\/document_detail\/47550.html<br>[420] https:\/\/github.com\/cookieY\/Yearning<br>[421] https:\/\/github.com\/jumpserver\/jumpserver<br>[422] https:\/\/guacamole.apache.org\/<br>[423] https:\/\/www.kali.org\/<br>[424] https:\/\/linux.backbox.org\/<br>[425] https:\/\/www.parrotsec.org\/<br>[426] http:\/\/www.deftlinux.net\/<br>[427] https:\/\/www.metasploit.com\/<br>[428] https:\/\/github.com\/n1nj4sec\/pupy<br>[429] https:\/\/github.com\/stevenaldinger\/decker<br>[430] https:\/\/github.com\/gyoisamurai\/GyoiThon<br>[431] https:\/\/github.com\/enaqx\/awesome-pentest<br>[432] https:\/\/github.com\/mozilla\/mig<br>[433] https:\/\/github.com\/TheHive-Project\/TheHive<br>[434] https:\/\/github.com\/flyve-mdm<br>[435] https:\/\/github.com\/bryanpkc\/corkscrew<br>[436] https:\/\/cloud.google.com\/beyondcorp\/?hl=zh-cn<br>[437] https:\/\/github.com\/Valve\/fingerprintjs2<br>[438] https:\/\/github.com\/jackspirou\/clientjs<br>[439] https:\/\/github.com\/ay-kay\/unique<br>[440] https:\/\/github.com\/salesforce\/pixel-captcha-project<br>[441] https:\/\/github.com\/ecthros\/uncaptcha2<br>[442] https:\/\/www.drools.org\/<br>[443] https:\/\/github.com\/jdereg\/n-cube<br>[444] https:\/\/www.h2o.ai\/solutions\/usecases\/<br>[445] https:\/\/www.slideshare.net\/0xdata\/paypal-fraud-detection-with-deep-learning-in-h2o-presentationh2oworld2014<br>[446] https:\/\/shiring.github.io\/machine_learning\/2017\/05\/01\/fraud<br>[447] https:\/\/ieeexplore.ieee.org\/abstract\/document\/7838276<br>[448] https:\/\/zhuanlan.zhihu.com\/p\/36530032<br>[449] http:\/\/ramok.tech\/2017\/09\/08\/fraud-detection-with-java-and-spark-mlib\/<br>[450] https:\/\/github.com\/klevis\/frauddetection<br>[451] https:\/\/github.com\/GitiHubi\/deepAI<br>[452] https:\/\/github.com\/yazanobeidi\/fraud-detection<br>[453] https:\/\/github.com\/entrepreneur-interet-general\/graph-explorer<br>[454] https:\/\/neo4j.com\/use-cases\/fraud-detection\/<br>[455] https:\/\/www.dataguise.com\/<br>[456] https:\/\/www.ibm.com\/security\/data-security\/guardium<br>[457] https:\/\/www.microfocus.com\/en-us\/products\/voltage-data-encryption-security\/overview<br>[458] http:\/\/sentry.apache.org\/<br>[459] http:\/\/knox.apache.org\/<br>[460] http:\/\/ranger.apache.org\/<br>[461] http:\/\/eagle.apache.org\/<br>[462] https:\/\/github.com\/troydo42\/CIA-Hacking-Tools\/tree\/master\/Scribbles\/<br>[463] https:\/\/github.com\/arx-deidentifier\/arx<br>[464] https:\/\/github.com\/uber\/sql-differential-privacy<br>[465] https:\/\/github.com\/google\/rappor<br>[466] https:\/\/github.com\/rdragos\/awesome-mpc<br>[467] https:\/\/github.com\/shaih\/HElib<br>[468] http:\/\/di.baidu.com\/product\/calc<br>[469] https:\/\/github.com\/hugegraph\/hugegraph<br>[470] http:\/\/www.trustedcomputinggroup.org\/<br>[471] https:\/\/github.com\/PeterHuewe\/tpm-emulator<br>[472] http:\/\/sourceforge.net\/projects\/trousers<br>[473] http:\/\/ibmswtpm.sourceforge.net\/<br>[474] https:\/\/sourceforge.net\/p\/linux-ima\/wiki\/Home\/<br>[475] https:\/\/github.com\/pwnall\/sanctum<br>[476] https:\/\/keystone-enclave.org\/<br>[477] https:\/\/github.com\/opencomputeproject\/Project_Olympus\/tree\/master\/Project_Cerberus<br>[478] https:\/\/cloud.google.com\/blog\/products\/gcp\/titan-in-depth-security-in-plaintext<br>[479] https:\/\/github.com\/opencomputeproject\/Project_Olympus\/tree\/master\/Project_Cerberus<br>[480] https:\/\/github.com\/keystone-enclave\/<br>[481] https:\/\/github.com\/jirislaby\/ksplice<br>[482] https:\/\/ksplice.oracle.com\/<br>[483] https:\/\/github.com\/useidel\/kgraft-tools<br>[484] https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/jirislaby\/kgraft.git\/<br>[485] https:\/\/www.suse.com\/media\/presentation\/kGraft.pdf<br>[486] https:\/\/github.com\/dynup\/kpatch<br>[487] https:\/\/github.com\/torvalds\/linux\/tree\/master\/kernel\/livepatch<br>[488] https:\/\/www.kernel.org\/doc\/Documentation\/livepatch\/livepatch.txt<br>[489] https:\/\/www.kernelcare.com\/<br>[490] http:\/\/patches.kernelcare.com\/kmod_kcare.tar.gz<br>[491] https:\/\/github.com\/cloudlinux\/libcare<br>[492] http:\/\/firecracker-microvm.io\/<br>[493] https:\/\/github.com\/firecracker-microvm\/firecracker<br>[494] https:\/\/chromium.googlesource.com\/chromiumos\/platform\/crosvm\/<br>[495] https:\/\/android.googlesource.com\/platform\/external\/minijail\/<br>[496] https:\/\/www.twistlock.com\/<br>[497] https:\/\/github.com\/coreos\/clair<br>[498] https:\/\/github.com\/eliasgranderubio\/dagda<br>[499] https:\/\/github.com\/anchore\/anchore-engine<br>[500] https:\/\/github.com\/goharbor\/harbor<br>[501] https:\/\/katacontainers.io\/<br>[502] https:\/\/github.com\/kata-containers\/runtime<br>[503] https:\/\/github.com\/firecracker-microvm\/firecracker-containerd<br>[504] https:\/\/github.com\/google\/gvisor<br>[505] https:\/\/www.projectcalico.org\/<br>[506] https:\/\/github.com\/projectcalico<br>[507] https:\/\/cilium.io\/<br>[508] https:\/\/github.com\/cilium\/cilium<br>[509] https:\/\/www.aporeto.com\/opensource\/<br>[510] https:\/\/github.com\/aporeto-inc\/trireme-lib<br>[511] https:\/\/falco.org\/<br>[512] https:\/\/github.com\/falcosecurity\/falco<br>[513] https:\/\/github.com\/falcosecurity\/falco\/tree\/dev\/rules<br>[514] https:\/\/github.com\/capsule8\/capsule8<br>[515] https:\/\/github.com\/docker\/docker-bench-security<br>[516] https:\/\/github.com\/kost\/dockscan<br>[517] https:\/\/www.open-scap.org\/resources\/documentation\/security-compliance-of-rhel7-docker-containers\/<br>[518] https:\/\/docs.docker.com\/compliance\/<br>[519] https:\/\/github.com\/chromium\/chromium\/blob\/master\/docs\/design\/sandbox.md<br>[520] https:\/\/github.com\/chromium\/chromium\/tree\/master\/sandbox\/win<br>[521] https:\/\/github.com\/chromium\/chromium\/blob\/master\/docs\/linux_sandboxing.md<br>[522] https:\/\/github.com\/chromium\/chromium\/tree\/master\/sandbox\/linux<br>[523] https:\/\/github.com\/alibaba\/JVM-Sandbox<br>[524] https:\/\/cuckoosandbox.org\/<br>[525] https:\/\/github.com\/cuckoosandbox<br>[526] https:\/\/www.freedesktop.org\/software\/systemd\/man\/systemd.exec.html#Sandboxing<br>[527] https:\/\/android.googlesource.com\/platform\/external\/minijail\/<br>[528] https:\/\/chromium.googlesource.com\/chromiumos\/docs\/+\/master\/sandboxing.md<br>[529] https:\/\/github.com\/projectatomic\/bubblewrap<br>[530] https:\/\/github.com\/google\/sandboxed-api<br>[531] https:\/\/www.coursera.org\/learn\/machine-learning<br>[532] https:\/\/github.com\/ZuzooVn\/machine-learning-for-software-engineers<br>[533] https:\/\/github.com\/imhuay\/Algorithm_Interview_Notes-Chinese<br>[534] https:\/\/github.com\/kk7nc\/Text_Classification<br>[535] https:\/\/www.featuretools.com\/<br>[536] https:\/\/github.com\/scikit-learn-contrib\/boruta_py<br>[537] https:\/\/github.com\/hyperopt\/hyperopt-sklearn<br>[538] https:\/\/github.com\/AxeldeRomblay\/MLBox<br>[539] https:\/\/github.com\/ClimbsRocks\/auto_ml<br>[540] https:\/\/github.com\/h2oai\/h2o-3<br>[541] https:\/\/github.com\/endgameinc\/dga_predict<br>[542] https:\/\/github.com\/chwress\/salad<br>[543] https:\/\/github.com\/PositiveTechnologies\/seq2seq-web-attack-detection<br>[544] https:\/\/github.com\/makemytrip\/dataShark<br>[545] https:\/\/github.com\/georgymh\/ml-fraud-detection<br>[546] https:\/\/github.com\/klevis\/frauddetection<br>[547] https:\/\/github.com\/AFAgarap\/malware-classification<br>[548] https:\/\/github.com\/honeynet\/cuckooml<br>[549] https:\/\/github.com\/hgascon\/adagio<br>[550] https:\/\/github.com\/hgascon\/pulsar<br>[551] https:\/\/code.fb.com\/developer-tools\/getafix-how-facebook-tools-learn-to-fix-bugs-automatically\/<br>[552] https:\/\/github.com\/13o-bbr-bbq\/machine_learning_security\/tree\/master\/DeepExploit<br>[553] http:\/\/web.stanford.edu\/class\/cs259d\/<br>[554] https:\/\/github.com\/PacktPublishing\/Mastering-Machine-Learning-for-Penetration-Testing<br>[555] https:\/\/github.com\/SuperCowPowers\/data_hacking<br>[556] https:\/\/github.com\/13o-bbr-bbq\/machine_learning_security<br>[557] http:\/\/www.covert.io\/<br>[558] https:\/\/github.com\/jivoi\/awesome-ml-for-cybersecurity<br>[559] https:\/\/arxiv.org\/abs\/1412.6572<br>[560] https:\/\/github.com\/tensorflow\/cleverhans<br>[561] https:\/\/github.com\/baidu\/AdvBox<br>[562] https:\/\/github.com\/liftoff\/pyminifier<br>[563] https:\/\/github.com\/QQuick\/Opy<br>[564] https:\/\/github.com\/dashingsoft\/pyarmor<br>[565] https:\/\/arxiv.org\/abs\/1610.05755v3<br>[566] https:\/\/github.com\/tensorflow\/privacy<br>[567] https:\/\/github.com\/google\/nsjail<br>[568] https:\/\/security.googleblog.com\/2016\/07\/experimenting-with-post-quantum.html<br>[569] https:\/\/pqcrypto.org\/<br>[570] https:\/\/microsoft.github.io\/Picnic\/<br>[571] https:\/\/openquantumsafe.org\/<br>[572] https:\/\/github.com\/open-quantum-safe\/liboqs<br>[573] https:\/\/github.com\/cloudflare\/circl<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u53c2\u8003\u94fe\u63a5\uff1a<\/h5>\n\n\n\n<p>\u5927\u578b\u4e92\u8054\u7f51\u4f01\u4e1a\u5b89\u5168\u67b6\u6784<br><a href=\"http:\/\/www.broadview.com.cn\/book\/5241\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.broadview.com.cn\/book\/5241<\/a><\/p>\n\n\n\n<p>=END=<\/p>\n","protected":false},"excerpt":{"rendered":"<p>=Start= \u7f18\u7531\uff1a \u6574\u7406\u8bb0\u5f55\u4e00\u4e0b\u6700\u8fd1\u5728\u770b\u7684\u300a\u5927\u578b\u4e92\u8054\u7f51\u4f01\u4e1a\u5b89\u5168\u67b6\u6784\u300b\u4e00\u4e66\uff0c\u65b9\u4fbf\u540e\u7eed\u53c2\u8003\u5b66\u4e60\u3002 \u6b63\u6587\uff1a \u53c2\u8003 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,25],"tags":[30,37,724,1578],"class_list":["post-4925","post","type-post","status-publish","format-standard","hentry","category-knowledgebase-2","category-security","tag-linux","tag-security","tag-724","tag-1578"],"views":7602,"_links":{"self":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/4925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/comments?post=4925"}],"version-history":[{"count":1,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/4925\/revisions"}],"predecessor-version":[{"id":4926,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/4925\/revisions\/4926"}],"wp:attachment":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/media?parent=4925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/categories?post=4925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/tags?post=4925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}