-
1
-
-
84942265522
-
Antirez. New tcp scan method
-
February
-
antirez. New tcp scan method. BugTraq, http://www.securityfocus.com/archive/1/11581, February 2001.
-
(2001)
BugTraq
-
-
-
2
-
-
84942235897
-
-
ARPwatch. Lawrence Berkely National Labs Network Research Group, http://ftp.ee.lbl.gov.
-
ARPwatch
-
-
-
4
-
-
85084160196
-
Using the Domain Name System for System Break-ins
-
June
-
S. Bellovin. Using the Domain Name System for System Break-ins. Proc. of the 5th UNIX Security Symposium, pp.199-208, June 1995.
-
(1995)
Proc. of the 5th UNIX Security Symposium
, pp. 199-208
-
-
Bellovin, S.1
-
5
-
-
0002738343
-
Security Problems in the TCP/IP Protocol Suite
-
April
-
S. Bellovin. Security Problems in the TCP/IP Protocol Suite. Computer Communications Review, vol. 19, no. 2, pp. 32-48, April 1989.
-
(1989)
Computer Communications Review
, vol.19
, Issue.2
, pp. 32-48
-
-
Bellovin, S.1
-
7
-
-
84962214242
-
DECIDUOUS: Decentralized source identification for network-based intrusions
-
H. Chang, R. Narayan, S. Wu, B. Vetter, X. Wang, M. Brown, J. Yuill, C. Sargor, F. Jou, and F. Gong. DECIDUOUS: decentralized source identification for network-based intrusions. Proc. of the Sixth IFIP/IEEE International Symposium on Integrated Network Management, May 1999.
-
Proc. of the Sixth IFIP/IEEE International Symposium on Integrated Network Management, May 1999
-
-
Chang, H.1
Narayan, R.2
Wu, S.3
Vetter, B.4
Wang, X.5
Brown, M.6
Yuill, J.7
Sargor, C.8
Jou, F.9
Gong, F.10
-
8
-
-
0013240874
-
-
Computer Emergency Response Team, January
-
CERT Coordination Center. Smurf IP denial-of-service attacks. CERT Advisory CA-1998-01, Computer Emergency Response Team, http://www.cert.org/advisories/CA-1998-01.html, January 1998.
-
(1998)
Smurf IP Denial-of-service Attacks. CERT Advisory CA-1998-01
-
-
-
11
-
-
84867725901
-
-
April
-
CERT Coordination Center. Spoofed/Forged Email. http://www.cert.org/tech-tips/email-spoofing.html, April 1999.
-
(1999)
Spoofed/Forged Email
-
-
-
12
-
-
84942265525
-
IP Spoofing Demystified
-
June
-
Daemon9. IP Spoofing Demystified. Phrack Magazine Review, Vol 7, No. 48, 48-14, June 1996.
-
(1996)
Phrack Magazine Review
, vol.7
, Issue.48
, pp. 48-14
-
-
Daemon91
-
19
-
-
0034497721
-
Distributed denial of service attacks
-
October
-
F. Lau, S. H. Rubin, M. H. Smith, and Lj. Trajkovic. Distributed denial of service attacks. Proc. 2000 IEEE Int. Conf. on Systems, Man, and Cybernetics, Nashville, TN, pp. 2275-2280, October 2000.
-
(2000)
Proc. 2000 IEEE Int. Conf. on Systems, Man, and Cybernetics, Nashville, TN
, pp. 2275-2280
-
-
Lau, F.1
Rubin, S.H.2
Smith, M.H.3
Trajkovic, Lj.4
-
20
-
-
84942265527
-
-
October
-
L0pht Heavy Industries. Antisniff Technical Documentation. http://www.l0pht.com/antisniff/techaper.html, October 2000.
-
(2000)
Antisniff Technical Documentation
-
-
-
21
-
-
0002990537
-
End-to-end Routing Behavior in the Internet
-
to appear in
-
V. Paxson. End-to-end Routing Behavior in the Internet. to appear in Proc. SIGCOMM '96, August 1996.
-
Proc. SIGCOMM '96, August 1996
-
-
Paxson, V.1
-
26
-
-
0344523548
-
The Protocols
-
Addison-Wesley. 1st edition. December
-
W. Richard Stevens. TCP/IP Illustrated. Volume I - The Protocols. Addison-Wesley. 1st edition. December 1994.
-
(1994)
TCP/IP Illustrated
, vol.1
-
-
Stevens, W.R.1
-
31
-
-
0003307310
-
JiNao: Design and Implementation of a Scalable Intrusion Detection System for the OSPF Routing Protocol
-
S. Wu, H. Chang, et al. JiNao: Design and Implementation of a Scalable Intrusion Detection System for the OSPF Routing Protocol. Journal of Computer Networks and ISDN Systems, 1999.
-
(1999)
Journal of Computer Networks and ISDN Systems
-
-
Wu, S.1
Chang, H.2
-
33
-
-
84942265533
-
Practical Automated Detection of Stealthy Portscans
-
To be published
-
S. Staniford, J. Hoagland, and J. McAlerney. Practical Automated Detection of Stealthy Portscans. To be published, Journal of Computer Security. http://www.silicondefense.com/pptntext/Spice-JCS.pdf
-
Journal of Computer Security
-
-
Staniford, S.1
Hoagland, J.2
McAlerney, J.3
|