-
1
-
-
33947097923
-
-
CERT/CC, Denial of Service Attacks, Available Online: http://www.cert.org/tech_tips/denial_of_service.html. 2001.
-
CERT/CC, "Denial of Service Attacks", Available Online: http://www.cert.org/tech_tips/denial_of_service.html. 2001.
-
-
-
-
2
-
-
41149121582
-
Computer Crime and Security Survey
-
CSI/FBI
-
CSI/FBI, "Computer Crime and Security Survey" - Ninth Annual Report, 2004.
-
(2004)
Ninth Annual Report
-
-
-
6
-
-
33947131196
-
-
NetStumbler software and website details
-
NetStumbler software and website details: http://www.netstumbler.org
-
-
-
-
7
-
-
33947155810
-
-
LinkFerret software and website details
-
LinkFerret software and website details: http://www.linkferret.ws/
-
-
-
-
8
-
-
33947178418
-
-
Ethereal Software details
-
Ethereal Software details: http://www.ethereal.com/
-
-
-
-
9
-
-
33947129172
-
-
Paoketyzer Software details
-
Paoketyzer Software details: http://www.networkchemistry.com/products/ packetyzer/
-
-
-
-
10
-
-
33947150474
-
The Art of War Driving (Unpublished work style)
-
unpublished
-
Biju Issac, Seibu Mary Jacob and Lawan A. Mohammed, "The Art of War Driving" (Unpublished work style), unpublished.
-
-
-
Issac, B.1
Mary Jacob, S.2
Mohammed, L.A.3
-
11
-
-
0004104571
-
Unsafe at Any Key Size: An Analysis of WEP encapsulation
-
Technical Report 03628E. IEEE 802.11 committee
-
Walker, J., "Unsafe at Any Key Size: An Analysis of WEP encapsulation", Technical Report 03628E. IEEE 802.11 committee
-
-
-
Walker, J.1
-
16
-
-
33947156720
-
-
French Security Incident Response Team FrSirt, Available Online
-
French Security Incident Response Team (FrSirt), "Nortel Networks VPN Router 600 Denial of Service Vulnerability", Available Online: http://www.frsirt.com/english/advisories/2005/0642, 2005.
-
(2005)
Nortel Networks VPN Router 600 Denial of Service Vulnerability
-
-
-
17
-
-
33947133185
-
Computer Crime and Intellectual Property Section (CCIPS)
-
Available Online
-
"Computer Crime and Intellectual Property Section (CCIPS)", Available Online: http://www.cybercrime.gov/cepolicy.html#DDSA, 2000.
-
(2000)
-
-
-
19
-
-
33947185271
-
-
Cain & Abel software and website details
-
Cain & Abel software and website details: www.oxidt.it
-
-
-
-
20
-
-
33947100911
-
-
Mac Makeup software and website details
-
Mac Makeup software and website details: http://www.gorlani.com/ publicprj/macmakeup/macmakeup.asp
-
-
-
-
21
-
-
33947183821
-
-
Internet Control Message Protocol ICMP
-
Internet Control Message Protocol (ICMP). http://www.erg.abdn.ac.uk/ users/gorry/course/inet-pages/icmp.html
-
-
-
-
22
-
-
33947151515
-
-
ICMP Ping Flood software
-
ICMP Ping Flood software, www.portalsec.com by QX-Mat.
-
by QX-Mat
-
-
-
23
-
-
33947133719
-
The latest in denial of service attacks: "smurfing" description and information to minimize effects
-
Craig A. Huegen, "The latest in denial of service attacks: "smurfing" description and information to minimize effects", Available Online: hltp://www.pentics.net/denial-of-service/white-papers/ smurf.cgi, 2000.
-
(2000)
Available Online: Hltp
-
-
Huegen, C.A.1
-
25
-
-
11144272176
-
A Taxonomy of DDoS Attack and DDoS Defense Mechanisms
-
M. Jelena and Peter R., "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms", ACM SIGCOMM, Computer Communication Review, Vol. 34, No. 2. pp. 39 - 53, 2004.
-
(2004)
ACM SIGCOMM, Computer Communication Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Jelena, M.1
Peter, R.2
-
26
-
-
33947177612
-
-
Available Online
-
WLAN Attacks Explained, Available Online: http://neworder.box.sk/ newsread.php?newsid-7628
-
WLAN Attacks Explained
-
-
-
28
-
-
33947141434
-
-
Distributed Denial of Service by Trinity Security, Available Online
-
"Distributed Denial of Service (by Trinity Security)", Available Online: http://www.trinitysecurity.com/reference/bulletin/Trinity- DDOS-Protecting-Critical-Systems.pdf
-
-
-
-
29
-
-
33745445548
-
-
Paul Campbell, Ben Calvert and Steven Boswell, Security+ Guide to Network Security fundamentals, Thomson Course technology, 2003, pp. 47-84.
-
(2003)
Security+ Guide to Network Security fundamentals, Thomson Course technology
, pp. 47-84
-
-
Campbell, P.1
Calvert, B.2
Boswell, S.3
-
30
-
-
33947175088
-
-
CISCO White paper, Defining strategies to protect against TCP SYN Denial of Service Attacks, 2004.
-
CISCO White paper, "Defining strategies to protect against TCP SYN Denial of Service Attacks", 2004.
-
-
-
-
31
-
-
0004210998
-
-
O'Really, CA, USA
-
E. D. Zwicky, Cooper S., and Chapman D. B., Building Internet Firewalls 2e, O'Really, CA, USA, 2000.
-
(2000)
Building Internet Firewalls 2e
-
-
Zwicky, E.D.1
Cooper, S.2
Chapman, D.B.3
-
32
-
-
84983188846
-
-
Available Online
-
McAfee - Personal Firewall, Available Online: http://www.mcafee.com/ myapps/firewall/ov_firewall.asp
-
Personal Firewall
-
-
McAfee1
-
33
-
-
0003516333
-
Intrusion Detection Systems: A survey and Taxonomy
-
Tech Report 99-15, Dept. of Comp Eng, Chalmers University
-
S. Axelsson., "Intrusion Detection Systems: A survey and Taxonomy", Tech Report 99-15, Dept. of Comp Eng., Chalmers University, 2000.
-
(2000)
-
-
Axelsson, S.1
|