메뉴 건너뛰기




Volumn , Issue , 2000, Pages 69-75

Disarming offense to facilitate defense

Author keywords

Attack; Computer and network security; Defense; Disarm; Monitor; Offense

Indexed keywords

ELECTRONIC MAIL; INTRANETS; LEGACY SYSTEMS; SOFTWARE ENGINEERING;

EID: 0034593306     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/366173.366192     Document Type: Conference Paper
Times cited : (9)

References (29)
  • 1
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Fall
    • Aleph One, "Smashing the stack for fun and profit," Phrack Magazine 49, Fall 1997.
    • (1997) Phrack Magazine , vol.49
    • Aleph, O.1
  • 4
    • 0013301921 scopus 로고    scopus 로고
    • Linux security toolkit
    • Bandel D. "Linux Security Toolkit," IDG Books, 2000.
    • (2000) IDG Books
    • Bandel, D.1
  • 5
    • 84958742099 scopus 로고    scopus 로고
    • A tool for pro-active defense against the buffer overrun attack
    • LNCS 1485
    • Banfi R., Bruschi D., Rosti E., "A tool for pro-active defense against the buffer overrun attack," Proc. of ESORICS '98, LNCS 1485, pp. 17-31, 1998.
    • (1998) Proc. of ESORICS '98 , pp. 17-31
    • Banfi, R.1    Bruschi, D.2    Rosti, E.3
  • 8
    • 0013191703 scopus 로고    scopus 로고
    • TCP SYN flooding attacks and IP spoofing attacks
    • CERT-CC, "TCP SYN flooding attacks and IP Spoofing attacks," CERT Advisory CA-96.21, http://www.cert.org, 1996-98.
    • (1996) CERT Advisory CA-96.21
  • 9
    • 0013301922 scopus 로고    scopus 로고
    • Denial of service attack via ping
    • CERT-CC, "Denial of service attack via ping," CERT Advisory CA-96.26, http://www.cert.org, 1996-97.
    • (1996) CERT Advisory CA-96.26
  • 10
    • 0013195017 scopus 로고    scopus 로고
    • IP denial of service attacks
    • CERT-CC, "IP Denial of service attacks," CERT Advisory CA-97.28, http://www.cert.org, 1997-98.
    • (1997) CERT Advisory CA-97.28
  • 12
    • 0003336855 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • January
    • Ferguson P., Senie D., "Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing," Network Working Group RFC 2267, http://www.rfc-editor.org/rfc/rfc2267.txt, January 1998.
    • (1998) Network Working Group RFC , vol.2267
    • Ferguson, P.1    Senie, D.2
  • 16
    • 0013197876 scopus 로고    scopus 로고
    • The limitations of intrusion detection systems on high speed networks
    • Louvain La Neuve, Belgium, Sept.
    • J. Kleinwaechter, "The limitations of intrusion detection systems on high speed networks," presented at the "First International Workshop on Recent Advances in Intrusion Detection (RAID)," http://www.zurich.ibm.com/̃dac/RAID98, Louvain La Neuve, Belgium, Sept. 1998.
    • (1998) First International Workshop on Recent Advances in Intrusion Detection (RAID)
    • Kleinwaechter, J.1
  • 19
    • 84874953600 scopus 로고    scopus 로고
    • Mudge
    • Mudge, "How to write buffer overflow," http://www.10pht.com/advisories/bufero.html 1997.
    • (1997) How to Write Buffer Overflow
  • 20
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • B.C. Neuman, T. Ts'o, "Kerberos: an authentication service for computer networks," IEEE Communications, Vol 32, No 9, pp 33-38, 1994.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'o, T.2
  • 22
    • 0013242905 scopus 로고    scopus 로고
    • Open Door Networks, "Door Stop Personal Firewall," http://www2.opendoor.com/doorstop/, 2000.
    • (2000) Door Stop Personal Firewall
  • 26
    • 84881146783 scopus 로고    scopus 로고
    • Solar Designer
    • Solar Designer, "Non-Executable user stack," http://www.false.com/security/linux-stack/.
    • Non-Executable User Stack
  • 29
    • 0013192981 scopus 로고    scopus 로고
    • TinySoftware, "Tiny Personal Firewall," http://www.tinysoftware.com, 2000.
    • (2000) Tiny Personal Firewall


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.