-
1
-
-
41149177499
-
-
CERT/CC, Denial of Service Attacks, Available Online: http://www.cert.org/tech_tips/denial_of_service.html, 2001.
-
CERT/CC, "Denial of Service Attacks", Available Online: http://www.cert.org/tech_tips/denial_of_service.html, 2001.
-
-
-
-
2
-
-
41149121582
-
Computer Crime and Security Survey -
-
CSI/FBI
-
CSI/FBI, "Computer Crime and Security Survey" - Ninth Annual Report, 2004.
-
(2004)
Ninth Annual Report
-
-
-
4
-
-
41149117989
-
-
US/CERT, Multiple Denial-of-Service Vulnerabilities in Cisco IOS, Available online: http://www.us-cert.gov/cas/techalerts/TA05-026A. html, 2005.
-
US/CERT, "Multiple Denial-of-Service Vulnerabilities in Cisco IOS", Available online: http://www.us-cert.gov/cas/techalerts/TA05-026A. html, 2005.
-
-
-
-
6
-
-
41149115599
-
-
NetStumbler software and website details
-
NetStumbler software and website details: http://www.netstumbler.org
-
-
-
-
7
-
-
41149106363
-
-
LinkFerret software and website details
-
LinkFerret software and website details: http://www.linkferret.ws/
-
-
-
-
8
-
-
41149147581
-
-
Ethereal Software details
-
Ethereal Software details: http://www.ethereal.com/
-
-
-
-
9
-
-
41149162641
-
-
Packetyzer Software details
-
Packetyzer Software details: http://www.networkchemistry.com/products/ packetyzer/
-
-
-
-
10
-
-
33947150474
-
The Art of War Driving (Unpublished work style)
-
unpublished
-
Biju Issac, Seibu Mary Jacob and Lawan A. Mohammed, "The Art of War Driving" (Unpublished work style), unpublished.
-
-
-
Issac, B.1
Mary Jacob, S.2
Mohammed, L.A.3
-
11
-
-
0004104571
-
Unsafe at Any Key Size: An Analysis of WEP encapsulation
-
Technical Report 03628E. IEEE 802.11 committee
-
Walker, J., "Unsafe at Any Key Size: An Analysis of WEP encapsulation", Technical Report 03628E. IEEE 802.11 committee,
-
-
-
Walker, J.1
-
13
-
-
41149099017
-
-
IEEE-SA, Standards Board, IEEE Std IEEE 802.11-1999 Information Technology - Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) And Physical Layer (PHY) Specifications, Available Online: http://standards.ieee.org/getieee802/ download/802.11-1999.pdf, 1999.
-
IEEE-SA, Standards Board, "IEEE Std IEEE 802.11-1999 Information Technology - "Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) And Physical Layer (PHY) Specifications", Available Online: http://standards.ieee.org/getieee802/ download/802.11-1999.pdf, 1999.
-
-
-
-
16
-
-
33947156720
-
-
French Security Incident Response Team FrSirt, Available Online:, 2005
-
French Security Incident Response Team (FrSirt), "Nortel Networks VPN Router 600 Denial of Service Vulnerability", Available Online: http://www.frsirt.com/english/advisories/2005/0642, 2005.
-
Nortel Networks VPN Router 600 Denial of Service Vulnerability
-
-
-
19
-
-
41149132811
-
-
Cain & Abel software and website details
-
Cain & Abel software and website details: www.oxidt.it
-
-
-
-
20
-
-
41149144146
-
-
Mac Makeup software and website details
-
Mac Makeup software and website details: http://www.gorlani.com/ publicprj/macmakeup/macmakeup.asp
-
-
-
-
21
-
-
41149158600
-
-
Internet Control Message Protocol ICMP
-
Internet Control Message Protocol (ICMP). http://www.erg.abdn.ac.uk/ users/gorry/course/inet-pages/icmp.html
-
-
-
-
22
-
-
41149094504
-
-
ICMP Ping Flood software
-
ICMP Ping Flood software, www.portalsec.com by QX-Mat.
-
-
-
-
25
-
-
11144272176
-
A Taxonomy of DDoS Attack and DDoS Defense Mechanisms
-
M. Jelena and Peter R., "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms", ACM SIGCOMM, Computer Communication Review, Vol. 34, No. 2. pp. 39 - 53, 2004.
-
(2004)
ACM SIGCOMM, Computer Communication Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Jelena, M.1
Peter, R.2
-
26
-
-
33947177612
-
-
Available Online
-
WLAN Attacks Explained, Available Online: http://neworder.box.sk/ newsread.php?newsid=7628
-
WLAN Attacks Explained
-
-
-
28
-
-
41149122110
-
-
Distributed Denial of Service by Trinity Security, Available Online
-
"Distributed Denial of Service (by Trinity Security)", Available Online: http://www.trinitysecurity.com/reference/bulletin/Trinity- DDOS-Protecting-Critical-Systems.pdf
-
-
-
-
29
-
-
33745445548
-
-
Paul Campbell, Ben Calvert and Steven Boswell, Security+ Guide to Network Security fundamentals, Thomson Course technology, 2003, pp. 47 - 84.
-
(2003)
Security+ Guide to Network Security fundamentals, Thomson Course technology
, pp. 47-84
-
-
Campbell, P.1
Calvert, B.2
Boswell, S.3
-
30
-
-
41149136146
-
-
CISCO White paper, Defining strategies to protect against TCP SYN Denial of Service Attacks, 2004.
-
CISCO White paper, "Defining strategies to protect against TCP SYN Denial of Service Attacks", 2004.
-
-
-
-
31
-
-
0004210998
-
-
O'Really, CA, USA
-
E. D. Zwicky, Cooper S., and Chapman D. B., Building Internet Firewalls 2e, O'Really, CA, USA, 2000.
-
(2000)
Building Internet Firewalls 2e
-
-
Zwicky, E.D.1
Cooper, S.2
Chapman, D.B.3
-
32
-
-
84983188846
-
-
Available Online
-
McAfee - Personal Firewall, Available Online: http://www.mcafee.com/ myapps/firewall/ov_firewall.asp
-
Personal Firewall
-
-
-
33
-
-
0003516333
-
Intrusion Detection Systems: A survey and Taxonomy
-
Tech Report 99-15, Dept. of Comp Eng, Chalmers University
-
S. Axelsson., "Intrusion Detection Systems: A survey and Taxonomy", Tech Report 99-15, Dept. of Comp Eng., Chalmers University, 2000.
-
(2000)
-
-
Axelsson, S.1
|