메뉴 건너뛰기




Volumn , Issue , 2000, Pages 119-124

Network traffic tracking systems: Folly in the large?

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK PROTOCOLS; ROUTERS; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 0034593159     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (23)
  • 1
    • 0002738343 scopus 로고
    • Security problems in the TCP-IP protocol suite
    • April
    • S. M. Bellovin. Security Problems in the TCP-IP Protocol Suite. Computer Communications Review, 19(2):32-48, April 1989.
    • (1989) Computer Communications Review , vol.19 , Issue.2 , pp. 32-48
    • Bellovin, S.M.1
  • 3
    • 0003659019 scopus 로고    scopus 로고
    • C. A. CA-96.21. September
    • C. A. CA-96.21. TCP SYN Flooding and IP Spoofing Attacks. http://www.cert.org/advisories/CA-96.21.tcp_syn_flooding.html, September 1996.
    • (1996) TCP SYN Flooding and IP Spoofing Attacks
  • 4
    • 0011192575 scopus 로고    scopus 로고
    • C. A. CA-97.28. December
    • C. A. CA-97.28. IP Denial-of-Service Attacks. http://www.cert.org/advisories/CA-97.28.Teardrop_Land.html, December 1997.
    • (1997) IP Denial-of-Service Attacks
  • 5
    • 0013240874 scopus 로고    scopus 로고
    • C. A. CA-98.01. January
    • C. A. CA-98.01. 'Smurf' IP Denial-of-Service Attacks. http://www.cert.org/advisories/CA-98.01.smurf.html, January 1998.
    • (1998) 'Smurf' IP Denial-of-Service Attacks
  • 6
    • 0013190646 scopus 로고    scopus 로고
    • C. A. CA-98.13. html, December
    • C. A. CA-98.13. Vulnerability in Certain TCP/IP Implementations. http://www.cert.org/advisories/CA-98-13-tcp-denial-of-service.html, December 1998.
    • (1998) Vulnerability in Certain TCP/IP Implementations
  • 7
    • 0004094719 scopus 로고    scopus 로고
    • This was a publically available PERL script that attempted to trace a denial-of-service attack through a series of Cisco routers. It was released into the public domain, but later withdrawn. Copies are still available on some websites, June
    • H. Chang and D.Drew. DoSTracker. This was a publically available PERL script that attempted to trace a denial-of-service attack through a series of Cisco routers. It was released into the public domain, but later withdrawn. Copies are still available on some websites, June 1997.
    • (1997) DoSTracker
    • Chang, H.1    Drew, D.2
  • 8
    • 0013294760 scopus 로고    scopus 로고
    • Technical report, Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University
    • T. E. Daniels, B. Kuperman, and C. Shields. Packet tracker technical report 1. Technical report, Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, 1999.
    • (1999) Packet Tracker Technical Report , vol.1
    • Daniels, T.E.1    Kuperman, B.2    Shields, C.3
  • 10
    • 0013295960 scopus 로고    scopus 로고
    • Feds ok cell phone tracking
    • September
    • J. Glasner. Feds ok cell phone tracking. Wired News, September 1999.
    • (1999) Wired News
    • Glasner, J.1
  • 11
    • 0013191717 scopus 로고    scopus 로고
    • C. I. N. IN-99-07. November
    • C. I. N. IN-99-07. Distributed denial of service tools. http://www.cert.org/incident_notes/IN-99-07.html November 1999.
    • (1999) Distributed Denial of Service Tools
  • 16
    • 0003804730 scopus 로고
    • Technical Report 17, AT&T Bell Laboratories, Computing Science Technical Report
    • R. Morris. A Weakness in the 4.2BSD Unix TCP-IP Software. Technical Report 17, AT&T Bell Laboratories, 1985. Computing Science Technical Report.
    • (1985) A Weakness in the 4.2BSD Unix TCP-IP Software
    • Morris, R.1
  • 19
    • 0013191719 scopus 로고    scopus 로고
    • Intrusion detection and isolation protocol: Automated response to attacks
    • Sep.
    • J. Rowe. Intrusion detection and isolation protocol: Automated response to attacks. Presentation at RAID'99, Sep 1999.
    • (1999) RAID'99
    • Rowe, J.1
  • 23
    • 0013294761 scopus 로고    scopus 로고
    • Stepping stone detection
    • New Areas of Research, August
    • Y. Zhang and V. Paxson. Stepping Stone Detection. Presentation at SIGCOMM'99, New Areas of Research, August 1999.
    • (1999) SIGCOMM'99
    • Zhang, Y.1    Paxson, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.