-
2
-
-
0003659019
-
-
November 29, [Online]. Available
-
Computer Emergency Response Team (CERT). (2000, November 29). TCP SYN flooding and IP spoofing attacks. [Online]. Available: http://www.cert.org/ advisories/CA-1996-21.html .
-
(2000)
TCP SYN Flooding and IP Spoofing Attacks
-
-
-
3
-
-
0242457847
-
-
March, [Online]. Available
-
Computer Emergency Response Team(CERT). ( 2000, March). Smurf IP Denial-of-Service Attacks. [Online]. Available: http://www/cert.org/advisories/ CA-1998-01.html.
-
(2000)
Smurf IP Denial-of-Service Attacks
-
-
-
5
-
-
69249204694
-
-
March 11, [Online]. Available
-
Tanase M. (2003, March 11). IP Spoofing an Introduction. [Online]. Available: http://www.securityfocus.com/infocus/1674 .
-
(2003)
IP Spoofing An Introduction
-
-
Tanase, M.1
-
6
-
-
3042686301
-
A graphbased methodology for analyzing ip spoofing attack. [C]
-
March
-
V. Santiraveewan, Y. Permpoontanalarp. (2004,March) A Graphbased Methodology for Analyzing IP Spoofing Attack. [C]. 18th AINA, pp227-231.
-
(2004)
18th AINA
, pp. 227-231
-
-
Santiraveewan, V.1
Permpoontanalarp, Y.2
-
9
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. [C]
-
August 2001
-
K. Park, H. Lee. (2001, August) On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets. [C]. ACM SIGCOMM 2001.
-
(2001)
ACM SIGCOMM
-
-
Park, K.1
Lee, H.2
-
11
-
-
37349125374
-
DDoS attack detection method using cluster analysis. [J]
-
K. Lee, J. Kim, K.H. Kwon, et al. (2008). DDoS attack detection method using cluster analysis. [J]. Expert Systems with Applications 34, pp1659-1665.
-
(2008)
Expert Systems with Applications
, vol.34
, pp. 1659-1665
-
-
Lee, K.1
Kim, J.2
Kwon, K.H.3
-
12
-
-
69249207054
-
Defenses against TCP SYN flooding attacks. [J]
-
Dec.
-
W. Eddy. (2006, Dec.). Defenses Against TCP SYN Flooding Attacks. [J]. The Internet Protocol Journal, Volume 9, No.4.
-
(2006)
The Internet Protocol Journal
, vol.9
, Issue.4
-
-
Eddy, W.1
-
13
-
-
33750958535
-
Defending against TCP SYN flooding attacks under different types of IP spoofing [C]
-
Jan
-
W. Chen, D. Y. Yeung. Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing [C]. ICN/ICONS/MCL Jan 2006, pp38-43.
-
(2006)
ICN/ICONS/MCL
, pp. 38-43
-
-
Chen, W.1
Yeung, D.Y.2
-
14
-
-
33947503628
-
Defense against spoofed ip traffic using hop-count filtering. [J]
-
February
-
H. Wang, G. Jin, K. G. Shin. Defense Against Spoofed IP Traffic Using Hop-Count Filtering. [J]. IEEE/ACM Transactions on Networking, Vol 15, No 1, February 2007.
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.1
-
-
Wang, H.1
Jin, G.2
Shin, K.G.3
-
17
-
-
77954254768
-
-
[Online]. Available
-
MIT IP Spoofer Project website. [Online]. Available: http://spoofer. csail.mit.edu/summary.php.
-
MIT IP Spoofer Project Website
-
-
-
18
-
-
77954278030
-
An environment for "sniffing" DCE-RPC traffic
-
June 21, [Online]. Available
-
J. Howe. (1993, June 21). An Environment for "Sniffing" DCE-RPC Traffic, CITI Technical Report 93-94 [Online]. Available: http://www.citi. umich.edu/techreports/reports/citi-tr-93-4.pdf.
-
(1993)
CITI Technical Report
, pp. 93-94
-
-
Howe, J.1
-
19
-
-
77954301912
-
-
Dec. [Online]. Available
-
F. Ali. (2007, Dec.) IP Spoofing. [Online]. Available: http://www.cisco.com/web/about/ac123/ac147/archived-issues/ipj-10-4/ 104-ip-spoofing.html.
-
(2007)
IP Spoofing
-
-
Ali, F.1
-
21
-
-
77954270167
-
-
Oct 18, [Online]. Available
-
Bogon list sources. (Oct 18, 2003). [Online]. Available: http://www.completewhois.com/bogons/.
-
(2003)
Bogon List Sources
-
-
-
25
-
-
27544436002
-
-
Mar 7, [Online]. Available
-
J. Barlow, W. Thrower. (2000, Mar 7). TFN2K-An Analysis. [Online]. Available: http://www.packetstormsecurity.org/distributed/TFN2k-Analysis-1.3. txt.
-
(2000)
TFN2K-An Analysis
-
-
Barlow, J.1
Thrower, W.2
-
27
-
-
77954260368
-
-
[Online]. Available
-
Cisco IOS, (2005). Unicast reverse path forwarding. [Online]. Available: http://www.cisco.com/en/US/docs/ios/12-2t/12-2t13/feature/guide/ft-urpf. html#wp1048141.
-
(2005)
Unicast Reverse Path Forwarding
-
-
-
28
-
-
33750699316
-
New architecture for intra-domain network security issues. [J]
-
Nov
-
D. Huang, Q. Cao, A. Sinha, et al. New Architecture For Intra-Domain Network Security Issues. [J]. Communications of the ACM, Nov 2006, pp64-72.
-
(2006)
Communications of the ACM
, pp. 64-72
-
-
Huang, D.1
Cao, Q.2
Sinha, A.3
-
29
-
-
77954259737
-
-
(Jun 5). [Online]. Available
-
Definition of man-in-the-middle. (2007, Jun 5). [Online]. Available: http://searchsecurity.techtarget.com/sDefinition/0sid14-gci499492,00.html.
-
(2007)
Definition of Man-in-the-middle
-
-
-
31
-
-
28044457069
-
Network telescopes
-
D. Moore, C. Shannon, G. M. Voelker, et al. Network telescopes, CAIDA, Tech. Rep., 2003.
-
(2003)
CAIDA, Tech Rep.
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
-
32
-
-
0003608455
-
Internet control message protocol
-
Sep. [Online]. Available
-
J. Postel. (1981, Sep.). Internet control message protocol, DARPA Internet program protocol specification. [Online]. Available: http://www.ietf.org/rfc/rfc792.txt?number=792 .
-
(1981)
DARPA Internet Program Protocol Specification
-
-
Postel, J.1
-
33
-
-
77954303864
-
-
[Online]. Available
-
Tcpipguide. [Online]. Available: http://www.tcpipguide.com/
-
-
-
-
36
-
-
77954259217
-
-
Microsoft Windows, [Online] Available
-
Microsoft Windows 2000 WebDAV buffer overflow vulnerability (MS03-007). [Online]. Available: http://www.securityfocus.com/bid/7116.
-
(2000)
WebDAV Buffer Overflow Vulnerability (MS03-007)
-
-
-
37
-
-
84874126880
-
-
[Online] Available
-
The Spamhaus Project [Online]. Available: http://www.spamhaus.org/.
-
The Spamhaus Project
-
-
-
40
-
-
77954278961
-
-
Analysis of Network Denial of Service, (Nov.) [Online]. Available
-
Analysis of Network Denial of Service. (2004, Nov.) [Online]. Available: http://www.ufsdump.org/papers/uuasc-novemberddos.pdf.
-
(2004)
-
-
-
41
-
-
48649106122
-
-
Apr. [Online]. Available
-
C. Kalt. (2000, Apr.). Internet relay chat: Architecture. [Online]. Available: http://www.ietf.org/rfc/rfc2810.txt?number=2810.
-
(2000)
Internet Relay Chat: Architecture
-
-
Kalt, C.1
|