-
1
-
-
0003516333
-
Intrusion Detection Systems: A Survey and Taxonomy
-
Tech Report 99-15, Dept. of Comp Eng, Chalmers University, Chalmers University, Sweden
-
Axelsson, S. (2000) Intrusion Detection Systems: A Survey and Taxonomy, Tech Report 99-15, Dept. of Comp Eng., Chalmers University, Chalmers University, Sweden.
-
(2000)
-
-
Axelsson, S.1
-
2
-
-
34248327933
-
-
Cain and Abel Software (CAAS, ) Retrieved July 16, from
-
Cain and Abel Software (CAAS) (2005) Retrieved July 16, from www.oxidt.it.
-
(2005)
-
-
-
3
-
-
33745445548
-
-
Campbell, P., Calvert, B. and Boswell, S. (2003) Security + Guide to Network Security Fundamentals, Thomson Course Technology, pp.47-84.
-
(2003)
Security + Guide to Network Security Fundamentals, Thomson Course Technology
, pp. 47-84
-
-
Campbell, P.1
Calvert, B.2
Boswell, S.3
-
4
-
-
34248383656
-
-
CERT/CC (2001) Denial of Service Attacks, Available Online: http: //www.cert.org/tech_tips/denial_of_service.html.
-
CERT/CC (2001) Denial of Service Attacks, Available Online: http: //www.cert.org/tech_tips/denial_of_service.html.
-
-
-
-
5
-
-
34248395148
-
-
CISCO White paper (2004) Defining Strategies to Protect Against TCP SYN Denial of Service Attacks.
-
CISCO White paper (2004) Defining Strategies to Protect Against TCP SYN Denial of Service Attacks.
-
-
-
-
7
-
-
34248391850
-
-
CSI/FBI , Computer Security Institute, USA, Retrieved July 4, 2005 from
-
CSI/FBI (2004) Computer Crime and Security Survey, Ninth Annual Report, Computer Security Institute, USA, Retrieved July 4, 2005 from http://www.reddshell.com/docs/csi_fbi_2004.pdf.
-
(2004)
Computer Crime and Security Survey, Ninth Annual Report
-
-
-
8
-
-
34248366550
-
-
Distributed Denial of Service (DDoS, ) Retrieved July 4, 2005 from
-
Distributed Denial of Service (DDoS) (2004) Retrieved July 4, 2005 from http://www.trinitysecurity.com/reference/bulletin/ Trinity-DDOS-Protecting-Critical-Systems.pdf.
-
(2004)
-
-
-
9
-
-
34248337924
-
-
Ethereal Software (ES, ) Retrieved July 8, from
-
Ethereal Software (ES) (2005) Retrieved July 8, from http:// www.ethereal.com/.
-
(2005)
-
-
-
10
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
Proceedings of Selected Areas of Cryptography SAC'01, Springer-Verlag, Berlin
-
Fluhrer, S., Mantin, I. and Shamir, A. (2001) 'Weaknesses in the key scheduling algorithm of RC4', Proceedings of Selected Areas of Cryptography (SAC'01), LNCS, Springer-Verlag, Berlin, Vol. 2259, pp.1-24.
-
(2001)
LNCS
, vol.2259
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
11
-
-
33947156720
-
-
French Security Incident Response Team FrSIRT, Retrieved July 23, from
-
French Security Incident Response Team (FrSIRT) (2005) Nortel Networks VPN Router 600 Denial of Service Vulnerability, Retrieved July 23, from http://www.frsirt.com/english/advisories/2005/0642.
-
(2005)
Nortel Networks VPN Router 600 Denial of Service Vulnerability
-
-
-
13
-
-
33947108403
-
-
Retrieved July 4, 2005 from
-
Geier. J. (2003) Denial of Service a Big WLAN Issue, Retrieved July 4, 2005 from http://www.wifiplanet.com/tutorials/article.php/ 2200071.
-
(2003)
Denial of Service a Big WLAN Issue
-
-
Geier, J.1
-
18
-
-
34248368095
-
-
Internet Control Message Protocol (ICMP, ) Retrieved July 24, from
-
Internet Control Message Protocol (ICMP) (2005) Retrieved July 24, from http://www.erg.abdn.ac.uk/users/gorry/course/inet-ages/icmp.html.
-
(2005)
-
-
-
19
-
-
33847312712
-
The art of war driving - a Malaysian case study
-
Issac, B., Jacob, S.M. and Mohammed, L.A. (2005) 'The art of war driving - a Malaysian case study', Proceedings of the IEEE International Conference on Networks, Vol. 1, pp.124-129.
-
(2005)
Proceedings of the IEEE International Conference on Networks
, vol.1
, pp. 124-129
-
-
Issac, B.1
Jacob, S.M.2
Mohammed, L.A.3
-
20
-
-
34248346321
-
-
Link Ferret Software (LFS, ) Retrieved July 8, from
-
Link Ferret Software (LFS) (2005) Retrieved July 8, from http:// www.linkferret.ws/.
-
(2005)
-
-
-
21
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
Jelena, M. and Peter, R. (2004) 'A taxonomy of DDoS attack and DDoS defense mechanisms', ACM SIGCOMM, Computer Communication Review, Vol. 34, No. 2, pp.39-53.
-
(2004)
ACM SIGCOMM, Computer Communication Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Jelena, M.1
Peter, R.2
-
22
-
-
34248370574
-
-
Mac Makeup Software (MMS, ) Retrieved July 14, from
-
Mac Makeup Software (MMS) (2005) Retrieved July 14, from http:// www.gorlani.com/publicprj/macmakeup/macmakeup.asp.
-
(2005)
-
-
-
23
-
-
84983188846
-
-
Retrieved July 29, 2005 from
-
McAfee (2005) Personal Firewall, Retrieved July 29, 2005 from http://www.mcafee.com/myapps/firewall/ov_firewall.asp.
-
(2005)
Personal Firewall
-
-
McAfee1
-
25
-
-
34248398488
-
-
NetStumbler Software (NSS, ) Retrieved July 4, from
-
NetStumbler Software (NSS) (2005) Retrieved July 4, from http:// www.netstumbler.org.
-
(2005)
-
-
-
26
-
-
34248365670
-
-
Packetyzer Software (PS, ) Retrieved July 9, from
-
Packetyzer Software (PS) (2005) Retrieved July 9, from http:// www.networkchemistry.com/products/packetyzer/.
-
(2005)
-
-
-
27
-
-
34248350787
-
-
Ping Flood Software (PFS, ) Retrieved July 4, 2005 from
-
Ping Flood Software (PFS) (2005) Retrieved July 4, 2005 from www.portalsec.com.
-
(2005)
-
-
-
29
-
-
34248394330
-
-
US/CERT (2005) Multiple Denial-of-Service Vulnerabilities in Cisco IOS, Retrieved July 4, from http://www.us-cert.gov/cas/techalerts/ TA05-026A.html.
-
US/CERT (2005) Multiple Denial-of-Service Vulnerabilities in Cisco IOS, Retrieved July 4, from http://www.us-cert.gov/cas/techalerts/ TA05-026A.html.
-
-
-
-
32
-
-
84948951525
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
Las Vegas, USA
-
Williamson, M. (2002) 'Throttling viruses: restricting propagation to defeat malicious mobile code', 18th Annual Comp. Sec. Applications Conference, Las Vegas, USA.
-
(2002)
18th Annual Comp. Sec. Applications Conference
-
-
Williamson, M.1
-
33
-
-
34248344664
-
-
Retrieved July 4, 2005 from
-
WLAN Attacks Explained (WLAN) (2003) Retrieved July 4, 2005 from http:// neworder.box.sk/newsread.php?newsid=7628.
-
(2003)
WLAN Attacks Explained (WLAN)
-
-
-
34
-
-
0004210998
-
-
O'Really, CA, USA
-
Zwicky, E.D., Cooper, S. and Chapman, D.B. (2000) Building Internet Firewalls 2e, O'Really, CA, USA.
-
(2000)
Building Internet Firewalls 2e
-
-
Zwicky, E.D.1
Cooper, S.2
Chapman, D.B.3
|