Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Reference Material W. Richard Stevens, TCP/IP Illustrated, Volume 1 The Protocols, Addison-Wesley Eric A. Hall, Internet Core Protocols, O’Reilly Craig H. Rowland, “Covert Channels in the TCP/IP Protocol Suite”, www.psionic.com/papers/covert/covert.tcp.txt Ofir Arkin, “ICMP Usage in Scanning”, www.sys-security.com Fyodor, “Remote OS detection via TCP/IP Stack FingerPrinting” www.insecure.org/nmap/nmap-fingerprinting-article Thomas Ptacek, Timothy Newsham, “Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection”, www.robertgraham.com/ mirror/Ptacek-Newsham-Evasion-98.html Rain Forest Puppy, “A look at whisker’s anti-IDS tactics”, www.wiretrip.net/rfp. | Network Traffic Analysis Using tcpdump Reference Material Judy Novak Johns Hopkins University Applied Physics Laboratory jhnovak@ix.netcom.com 1 All material Copyright Novak 2000 2001. All rights reserved. 1 This page intentionally left blank. References 2 2 Reference Material W. Richard Stevens TCP IP Illustrated Volume 1 The Protocols Addison-Wesley Eric A. Hall Internet Core Protocols O Reilly Craig H. Rowland Covert Channels in the TCP IP Protocol Suite www.psionic.com papers covert covert.tcp.txt Ofir Arkin ICMP Usage in Scanning www.sys-security.com Fyodor Remote OS detection via TCP IP Stack FingerPrinting www.insecure.org nmap nmap-fingerprinting-article Thomas Ptacek Timothy Newsham Insertion Evasion and Denial of Service Eluding Network Intrusion Detection www.robertgraham.com mirror Ptacek-Newsham-Evasion-98.html Rain Forest Puppy A look at whisker s anti-IDS tactics www.wiretrip.net rfp 3 This page intentionally left blank.