-
2
-
-
84889341449
-
-
Wired.com, Feb. 8, (15 May 2003)
-
"Yahoo on Trail of Site Hackers", Wired.com, Feb. 8, 2000. http://www.wired.eom/news/business/0, 1367, 34221, 00.html (15 May 2003).
-
(2000)
Yahoo on Trail of Site Hackers
-
-
-
3
-
-
85045186270
-
Spam Block Lists Bombed to Oblivion
-
MSNBC. COM 24 Sept (Jul. 5, 2004)
-
Brunker, Mike. "Spam Block Lists Bombed to Oblivion". MSNBC. COM 24 Sept 2003. http://www.msnbc.msn. com/id/3088113/(Jul. 5, 2004).
-
(2003)
-
-
Brunker, Mike1
-
4
-
-
0003976889
-
-
CERT Coordination Center, Carnegie Mellon Software Engineering Institute. Oct. (14 Mar. 2003)
-
Kevin J. Houle. "Trends in Denial of Service Attack Technology". CERT Coordination Center, Carnegie Mellon Software Engineering Institute. Oct. 2001. www.nanog.org/mtg-0110/ppt/houle.ppt. (14 Mar. 2003).
-
(2001)
Trends in Denial of Service Attack Technology
-
-
Houle, Kevin J.1
-
5
-
-
0008723266
-
Distributed Denial of Service TrinOO, Tribe Flood Network, Tribe Flood Network 2000, And StacheldrahtCIAC-2319
-
Department of Energy Computer Incident Advisory Capability (CIAC), UCRL-ID-136939, Rev. 1., Lawrence Livermore National Laboratory, Feb. 14
-
Paul J. Criscuolo. "Distributed Denial of Service TrinOO, Tribe Flood Network, Tribe Flood Network 2000, And StacheldrahtCIAC-2319". Department of Energy Computer Incident Advisory Capability (CIAC), UCRL-ID-136939, Rev. 1., Lawrence Livermore National Laboratory, Feb. 14, 2000.
-
(2000)
-
-
Criscuolo, Paul J.1
-
6
-
-
85132972723
-
-
TFreak. Oct. www.phreak.org/archives/exploits/denial/srnurf.c (6 May 2003)
-
TFreak. "smurf.c", www.phreak.org. Oct. 1997. www.phreak.org/archives/exploits/denial/srnurf.c (6 May 2003).
-
(1997)
smurf.c
-
-
-
8
-
-
85133025041
-
-
TFreak. (6 May)
-
TFreak. "fraggle.c", www.phreak.org, www.phreak.org/archives/exploits/denial/fraggle.c (6 May 2003).
-
(2003)
fraggle.c
-
-
-
9
-
-
85058655769
-
Router Expert: Smurf/Fraggle Attack Defense Using SACLS
-
Oct. http://searchnetworking.techtarget.com/tip/l, 289483, sid7_gci85 6112, 00.html (6 May 2003)
-
Martin, Michael J., "Router Expert: Smurf/Fraggle Attack Defense Using SACLS", Networking Tips and Newsletters, www.searchnetwork.techtarget.com. Oct. 2002. http://searchnetworking.techtarget.com/tip/l, 289483, sid7_gci85 6112, 00.html (6 May 2003).
-
(2002)
Networking Tips and Newsletters
-
-
Martin, Michael J.1
-
10
-
-
66249104798
-
-
Insecure.org. August (8 Apr. 2003)
-
"Nmap Stealth Port Scanner Introduction", Insecure.org. August 2002. http://www.insecure.org/nmap/. (8 Apr. 2003).
-
(2002)
Nmap Stealth Port Scanner Introduction
-
-
-
11
-
-
85132999935
-
-
CVE (version 20020625) Mar. 27, (9 Apr. 2003)
-
"CVE (version 20020625) ", Common Vulnerabilities and Exposures. Mar. 27, 2002. http://cve.mitre.org/cve/. (9 Apr. 2003).
-
(2002)
Common Vulnerabilities and Exposures
-
-
-
12
-
-
84862857038
-
Computer Viruses
-
Mar
-
Colon E. Pelaez and John Bowles, "Computer Viruses", System Theory, 1991, Twenty-Third Southeastern Symposium,. pp. 513-517, Mar. 1999.
-
(1999)
System Theory, 1991, Twenty-Third Southeastern Symposium
, pp. 513-517
-
-
Pelaez, Colon E.1
Bowles, John2
-
13
-
-
0002582136
-
Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade
-
Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole, "Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade", DARPA Information Survivability Conference and Exposition, 2000. Vol. 2, pp. 119-129, 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition
, vol.2
, Issue.2000
, pp. 119-129
-
-
Cowan, Crispin1
Wagle, Perry2
Pu, Calton3
Beattie, Steve4
Walpole, Jonathan5
-
14
-
-
85133010119
-
-
Microsoft. Microsoft Corporation. Jun. (5 Apr. 2003)
-
Microsoft. "How to Write Active X Controls for Microsoft Windows CE2.1", Microsoft Corporation. Jun. 1999. http://msdn. microsoft.com/library/default.asp7urWlibrary/en-us/dnce21/html/activexce.asp. (5 Apr. 2003).
-
(1999)
How to Write Active X Controls for Microsoft Windows CE2.1
-
-
-
15
-
-
85133029713
-
The Complete Windows Trojans Paper
-
Oct. 22, (9 Apr. 2003)
-
Dancho Danchev. "The Complete Windows Trojans Paper", BCVG Network Security. Oct. 22, 2002. http://www.ebcvg.com/articles.php?id=91. (9 Apr. 2003).
-
(2002)
BCVG Network Security
-
-
Danchev, Dancho1
-
17
-
-
85116622290
-
How Hackers Do It: Tricks, Tools, and Techniques
-
™Online. Part No.: 816-4816-10, Revision 1.0. May (8 Apr. 2003)
-
™Online. Part No.: 816-4816-10, Revision 1.0. May 2002. http://www.sun. com/solutions/blueprints/0502/816-4816-10.pdf. (8 Apr. 2003).
-
(2002)
-
-
Noordergraff, Alex1
-
18
-
-
35048849061
-
Enlisting Hardware Architecture to Thwart Malicious Code Injection
-
Springer Verlag, March
-
Ruby Lee, David Karig, Patrick McGregor and Zhijie Shi, "Enlisting Hardware Architecture to Thwart Malicious Code Injection", Proceedings of the International Conference on Security in Pervasive Computing (SPC-2003), LNCS 2802, pp. 237-252, Springer Verlag, March 2003.
-
(2003)
Proceedings of the International Conference on Security in Pervasive Computing (SPC-2003), LNCS 2802
, pp. 237-252
-
-
Lee, Ruby1
Karig, David2
McGregor, Patrick3
Shi, Zhijie4
-
19
-
-
84949199141
-
Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing
-
David Mankins, Rajesh Krishnan, Ceilyn Boyd, John Zao, and Michael Frentz, "Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing", Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17lh Annual, pp. 411-421, 2001.
-
(2001)
Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17lh Annual
, pp. 411-421
-
-
Mankins, David1
Krishnan, Rajesh2
Boyd, Ceilyn3
Zao, John4
Frentz, Michael5
-
20
-
-
51149105210
-
Proactive Detection of Distributed Denial of Service Attacks Using MIB Traffic Variables - A Feasibility Study
-
Joao B. D. Cabrera, Lundy Lewis, Xinzhou Qin, Wenke Lee, Ravi K. Prasanth, B. Ravichandran, and Ramon K. Mehra, "Proactive Detection of Distributed Denial of Service Attacks Using MIB Traffic Variables - A Feasibility Study", Integrated Network Management Proceedings, pp. 609-622, 2001.
-
(2001)
Integrated Network Management Proceedings
, pp. 609-622
-
-
Cabrera, Joao B. D.1
Lewis, Lundy2
Qin, Xinzhou3
Lee, Wenke4
Prasanth, Ravi K.5
Ravichandran, B.6
Mehra, Ramon K.7
-
21
-
-
0038404196
-
Defending Against Distributed Denial of Service Attacks with Max-min Fair Server-centric Router Throttles
-
David K. Yau, John C. S. Lui, and Feng Liang, "Defending Against Distributed Denial of Service Attacks with Max-min Fair Server-centric Router Throttles", Quality of Service, 2002 Tenth IEEE International Workshop, pp. 35-44, 2002.
-
(2002)
Quality of Service, 2002 Tenth IEEE International Workshop
, pp. 35-44
-
-
Yau, David K.1
Lui, John C. S.2
Liang, Feng3
-
23
-
-
0003375670
-
An Analysis of Using Reflectors for Distributed Denial of Service Attacks
-
Iss. Jul
-
Vern Paxon, "An Analysis of Using Reflectors for Distributed Denial of Service Attacks", ACMSIGCOMM Computer Communication Review, Vol. 31, Iss. 3, Jul. 2001.
-
(2001)
ACMSIGCOMM Computer Communication Review
, vol.31
, Issue.3
-
-
Paxon, Vern1
-
25
-
-
1242350164
-
-
Princeton University Department of Electrical Engineering Technical Report CE-L2003-03, May
-
Stephen Specht and Ruby Lee, "Distributed Denial.of Service: Taxonomies of Networks, Attacks, Tools, and Countermeasures, " Princeton University Department of Electrical Engineering Technical Report CE-L2003-03, May 2003
-
(2003)
Distributed Denial.of Service: Taxonomies of Networks, Attacks, Tools, and Countermeasures
-
-
Specht, Stephen1
Lee, Ruby2
|