-
1
-
-
0003236954
-
Requirements for IP version 4 routers
-
June 1995
-
F. Baker. Requirements for IP Version 4 Routers. RFC 1812, June 1995.
-
RFC
, vol.1812
-
-
Baker, F.1
-
3
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
Apr.
-
S. M. Bellovin. Security Problems in the TCP/IP Protocol Suite. ACM Computer Communications Review, 19(2):32-48, Apr. 1989.
-
(1989)
ACM Computer Communications Review
, vol.19
, Issue.2
, pp. 32-48
-
-
Bellovin, S.M.1
-
4
-
-
0004194675
-
-
Internet Draft: draft-bellovin-itrace-00.txt Mar.
-
S. M. Bellovin. ICMP Traceback Messages. Internet Draft: draft-bellovin-itrace-00.txt, Mar. 2000.
-
(2000)
ICMP Traceback Messages
-
-
Bellovin, S.M.1
-
5
-
-
0003292898
-
Requirements for internet hosts - Communication layers
-
Oct.
-
R. Braden. Requirements for Internet Hosts - Communication Layers. RFC 1122, Oct. 1989.
-
(1989)
RFC
, vol.1122
-
-
Braden, R.1
-
7
-
-
0031335263
-
Dynamic server selection using dynamic path characterization in wide-area networks
-
Kobe, Japan, Apr. 1997
-
R. L. Carter and M. E. Crovella. Dynamic Server Selection Using Dynamic Path Characterization in Wide-Area Networks. In Proceedings of the 1997 IEEE INFOCOM Conference, Kobe, Japan, Apr. 1997.
-
Proceedings of the 1997 IEEE Infocom Conference
-
-
Carter, R.L.1
Crovella, M.E.2
-
8
-
-
85037798955
-
-
Internet Mapping Project
-
B. Cheswick and H. Burch. Internet Mapping Project. http://cm.bell-labs.com/who/ches/map/index.html, 2000.
-
(2000)
-
-
Cheswick, B.1
Burch, H.2
-
9
-
-
79960376005
-
Configuring TCP intercept (prevent denial-of-service attacks)
-
Dec.
-
Cisco Systems. Configuring TCP Intercept (Prevent Denial-of-Service Attacks). Cisco IOS Documentation, Dec. 1997.
-
(1997)
Cisco IOS Documentation
-
-
-
16
-
-
85037800821
-
-
Computer Security Institute and Federal Bureau of Investigation. 1999 CSI/FBI Computer Crime and Security Survey. Computer Security Institute publication, Mar. 1999
-
Computer Security Institute and Federal Bureau of Investigation. 1999 CSI/FBI Computer Crime and Security Survey. Computer Security Institute publication, Mar. 1999.
-
-
-
-
17
-
-
0004631862
-
-
Cooperative Associationfor Internet Data Analysis. Skitter Analysis, http: //www.caida.org/Tools/Skitter/Summary/, 2000.
-
(2000)
Skitter Analysis
-
-
-
18
-
-
0004606472
-
Internet protocol, version 6 (ipv6)
-
Dec.
-
S. Deering. Internet protocol, version 6 (ipv6). RFC 2460, Dec. 1998.
-
(1998)
RFC
, vol.2460
-
-
Deering, S.1
-
20
-
-
0003336855
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
Jan.
-
P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing. RFC 2267, Jan. 1998.
-
(1998)
RFC
, vol.2267
-
-
Ferguson, P.1
Senie, D.2
-
21
-
-
0004606473
-
-
Jan.
-
J. Glave. Smurfing Cripples ISPs. Wired Technolgy News: (http://www.wired.com/news/news/technology/story/9506.html), Jan. 1998.
-
(1998)
Smurfing Cripples ISPs
-
-
Glave, J.1
-
26
-
-
0004601832
-
Photuris: Session-key management protocol
-
Mar.
-
P. Karn and W. Simpson. Photuris: Session-Key Management Protocol. RFC 2522, Mar. 1999.
-
(1999)
RFC
, vol.2522
-
-
Karn, P.1
Simpson, W.2
-
28
-
-
0003068282
-
Security architecture for the internet protocol
-
Nov.
-
S. Kent and R. Atkinson. Security architecture for the internet protocol. RFC 2401, Nov. 1998.
-
(1998)
RFC
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
30
-
-
0003359988
-
Path MTU discovery
-
Nov.
-
J. Mogul and S. Deering. Path MTU Discovery. RFC 1191, Nov. 1990.
-
(1990)
RFC
, vol.1191
-
-
Mogul, J.1
Deering, S.2
-
31
-
-
0003804730
-
A weakness in the 4.2BSD unix TCP/IP software
-
AT&T Bell Labs Feb.
-
R. T. Morris. A Weakness in the 4.2BSD Unix TCP/IP Software. Technical Report Computer Science #117, AT&T Bell Labs, Feb. 1985.
-
(1985)
Technical Report Computer Science #117
, vol.117
-
-
Morris, R.T.1
-
32
-
-
0031247411
-
End-to-end routing behavior in the Internet
-
Oct.
-
V. Paxson. End-to-End Routing Behavior in the Internet. IEEE/ACM Transactions on Networking, 5(5):601-615, Oct. 1997.
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.5
, pp. 601-615
-
-
Paxson, V.1
-
33
-
-
0001987976
-
IP mobility support
-
Oct.
-
C. Perkins. IP Mobility Support. RFC 2002, Oct. 1996.
-
(1996)
RFC
, vol.2002
-
-
Perkins, C.1
-
34
-
-
0003314621
-
Internet protocol
-
Sept.
-
J. Postel. Internet Protocol. RFC 791, Sept. 1981.
-
(1981)
RFC
, vol.791
-
-
Postel, J.1
-
35
-
-
0032074579
-
Anonymous connections and onion routing
-
May
-
M. G. Reed, P. F. Syverson, and D. M. Goldschlag. Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communications, 16(4):482-494, May 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
36
-
-
0003666575
-
-
Internet Draft: Draft-ietf-mpls-label-encaps-07.txt(expires March 2000) Sept.
-
E. C. Rosen, Y. Rekhter, D. Tappan, D. Farinacci, G. Fedorkow, T. Li, and A. Conta. MPLS Label Stack Encoding. Internet Draft: draft-ietf-mpls-label-encaps-07.txt (expires March 2000), Sept. 1998.
-
(1998)
MPLS Label Stack Encoding
-
-
Rosen, E.C.1
Rekhter, Y.2
Tappan, D.3
Farinacci, D.4
Fedorkow, G.5
Li, T.6
Conta, A.7
-
40
-
-
0033204164
-
Providing guaranteed services without per flow management
-
Boston, MA, Aug.
-
I. Stoica and H. Zhang. Providing Guaranteed Services Without Per Flow Management. In Proceedings of the 1999 ACM SIGCOMM Conference, pages 81-94, Boston, MA, Aug. 1999.
-
(1999)
Proceedings of the 1999 ACM SIGCOMM Conference
, pp. 81-94
-
-
Stoica, I.1
Zhang, H.2
-
43
-
-
0343035477
-
-
Personal communication, Feb.
-
C. Villamizar. Personal Communication, Feb. 2000.
-
(2000)
-
-
Villamizar, C.1
-
44
-
-
0004568554
-
A review of port scanning techniques
-
Apr.
-
M. Vivo, E. Carrasco, G. Isern, and G. O. Vivo. A review of port scanning techniques. ACM Computer Communications Review, 29(2):41-48, Apr. 1999.
-
(1999)
ACM Computer Communications Review
, vol.29
, Issue.2
, pp. 41-48
-
-
Vivo, M.1
Carrasco, E.2
Isern, G.3
Vivo, G.O.4
|