-
1
-
-
0005246691
-
The CAST-256 encryption algorithm
-
C. Adams J. Gilchrist The CAST-256 encryption algorithm June 1999 RFC 2612 http://www.cis.ohio-state.edu/htbin/rfc/rfc2612.html
-
(1999)
-
-
Adams, C.1
Gilchrist, J.2
-
2
-
-
85177134856
-
-
J. Barlow W. Thrower TFN2K-an analysis Feb. 2000 http://packetstorm.securify.com/distributed/TFN2k_ Analysis.htm
-
(2000)
-
-
Barlow, J.1
Thrower, W.2
-
3
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
S. Bellovin Security problems in the TCP/IP protocol suite Comput. Commun. Rev. 19 2 32 48 Apr. 1989
-
(1989)
Comput. Commun. Rev.
, vol.19
, Issue.2
, pp. 32-48
-
-
Bellovin, S.1
-
4
-
-
85177124760
-
-
S. Bellovin Distributed denial of service attacks Feb. 2000 http://www.research.att.com/~smb/talks
-
(2000)
-
-
Bellovin, S.1
-
5
-
-
0004194675
-
The ICMP traceback message
-
The ICMP traceback message Mar. 2000 http://www. research.att.com/~smb/papers/draft-bellovin-itrace-00.txt
-
(2000)
-
-
-
6
-
-
85177122240
-
-
CA-2000-01 denial-of-service developments CERT® Coordination Center http://www.cert.org/advisories/CA-2000-01.html
-
-
-
-
7
-
-
85177128085
-
-
CA-99-17 denial-of-service tools http://www.cert.org/advisories/CA-99-17-denial-of-service-tools.html
-
-
-
-
8
-
-
85177131322
-
-
CA-98-13-tcp-denial-of-service: vulnerability in certain TCP/IP implementations http://www.cert.org/advisories/CA-98-13-tcp-denial-of-service.html
-
-
-
-
9
-
-
85177115991
-
-
Results of the distributed systems intruder tools workshop Results of the distributed systems intruder tools workshop 1999-Nov. CERT® Coordination Center http://www.cert.org/reports/dsit_workshop.pdf
-
(1999)
-
-
-
10
-
-
85177105286
-
-
Defining strategies to protect against TCP SYN denial of service attacks July 1999 Cisco Systems, Inc. http://www.cisco.com/warp/public/707/4.html
-
(1999)
-
-
-
11
-
-
85177126328
-
IP-spoofing demystified: trust-relationship exploitation
-
IP-spoofing demystified: trust-relationship exploitation Phrack Mag. June 1996 Daemon9, Infinity, and Route http:.//www.fc.net/phrack/files/p48/p48-14.html
-
(1996)
Phrack Mag.
-
-
-
12
-
-
1242350165
-
The DoS project's 'Trinoo' distributed denial of service attack tool
-
D. Dittrich The DoS project's 'Trinoo' distributed denial of service attack tool Oct. 1999
-
(1999)
-
-
Dittrich, D.1
-
13
-
-
85177123717
-
-
-
-
-
14
-
-
85177139714
-
-
The 'Tribe Flood Network' distributed denial of service attack tool Oct. 1999 http://www.washington.edu/People/dad
-
(1999)
-
-
-
15
-
-
85177117978
-
-
D. Dittrich S. Dietrich N. Long An analysis of the 'Shaft' distributed denial of device tool Mar. 2000 http://netsec.gsfc.nasa.gov/~spock/shaft_analysis.txt
-
(2000)
-
-
Dittrich, D.1
Dietrich, S.2
Long, N.3
-
16
-
-
85177125382
-
-
P. Ferguson D. Senie RFC 2267: Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing Jan. 1998 http://info.internet.isi.edu/in-notes/rfc/files/rfc2267.txt
-
(1998)
-
-
Ferguson, P.1
Senie, D.2
-
17
-
-
0027647490
-
Random early detection gateways for congestion avoidance
-
S. Floyd V. Jacobson Random early detection gateways for congestion avoidance IEEE/ACM Trans. Networking 1 4 397 413 Aug. 1993
-
(1993)
IEEE/ACM Trans. Networking
, vol.1
, Issue.4
, pp. 397-413
-
-
Floyd, S.1
Jacobson, V.2
-
18
-
-
0029356674
-
Link-sharing and resource management models for packet networks
-
S. Floyd V. Jacobson Link-sharing and resource management models for packet networks IEEE/ACM Trans. Networking 3 4 365 386 Aug. 1995
-
(1995)
IEEE/ACM Trans. Networking
, vol.3
, Issue.4
, pp. 365-386
-
-
Floyd, S.1
Jacobson, V.2
-
19
-
-
85177109943
-
-
A. Harrison The denial-of-service aftermath Feb. 2000 http://www.cnn.com/2000/TECH/computing/02/14/dos.aftermath.idg/index.html
-
(2000)
-
-
Harrison, A.1
-
20
-
-
85177123937
-
-
C. A. Huegen The latest in denial of service attacks: 'Smurfing' description and information to minimize effects Feb. 2000 http://users.quadrunner.com/chuegen/smurf.cgi
-
(2000)
-
-
Huegen, C.A.1
-
21
-
-
85177142249
-
-
B. Martin Have script, will destroy (lessons in DoS) Feb. 2000 http://www.attrition.org
-
(2000)
-
-
Martin, B.1
-
22
-
-
85177143809
-
-
ns-2 network simulator http://www.isi.edu/nsnam/ns
-
-
-
-
23
-
-
0004145058
-
Insertion, evasion, and denial of service: eluding network intrusion detection
-
Secure Networks, Inc.
-
T. H. Ptacek T. N. Newsham Insertion, evasion, and denial of service: eluding network intrusion detection Jan. 1998 Secure Networks, Inc. http://www.clark.net/~roesch/idspaper.html
-
(1998)
-
-
Ptacek, T.H.1
Newsham, T.N.2
|