REFERENCES






REFERENCES

  1. R. Shirey, "Internet Security Glossary," Request for Comments 2828, May 2000.

  2. J. Scambray, S. McClure, and G. Kurtz, Hacking Exposed: Network Security Secrets and Solutions, 2nd Edition, McGraw-Hill, New York, 2000.

  3. M. G. Reed, P. F. Syverson, and D. M. Goldschlag, "Proxies for Anonymous Routing," Proceedings of Annual Computer Security Applications Conference (ACSAC '96), San Diego, CA, 1996, pp. 95-104.

  4. D. M. Goldschlag, M. G. Reed, and P. F. Syverson, "Privacy on the Internet," Proceedings of INET '97, June 1997.

  5. P. F. Syverson, D. M. Goldschlag, and M. G. Reed, "Anonymous Connections and Onion Routing," Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, May 1997, pp. 44–54.

  6. P. F. Syverson, M. G. Reed, and D. M. Goldschlag, "Private Web Browsing," Journal of Computer Security, Special Issue on Web Security, Vol. 5, No. 3, 1997, pp. 237-248.

  7. D. M. Goldschlag, M. G. Reed, and P. F. Syverson, "Onion Routing for Anonymous and Private Internet Connections," Communications of the ACM, Vol. 42, No. 2, 1999, pp. 39–41.

  8. C. L. Schuba, et al., "Analysis of a Denial of Service Attack on TCP," Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, May 1997.

  9. P. Ferguson and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing," Request for Comments 2267, January 1998.

  10. S. Savage, et al., Practical Network Support for IP Traceback, Department of Computer Science and Engineering, University of Washington, Seattle, Technical Report UW-CSE-00-02-01.

  11. R. Oppliger, "Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks," Proceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security, September 1999, pp. 163–175.

  12. E. W. Felten, et al., "Web Spoofing: An Internet Con Game," Proceedings of the National Information Systems Security Conference, October 1997.

  13. R. T. Morris, A Weakness in the 4.2BSD UNIX TCP/IP Software, Computer Science Technical Report No. 117, AT&T Bell Laboratories, Murray Hill, NJ, February 1985.

  14. S. M. Bellovin, "Security Problems in the TCP/IP Protocol Suite," ACM Computer Communication Review, Vol. 19, No. 2, 1989, pp. 32–48.

  15. S. Bellovin, "Defending Against Sequence Number Attacks," Request for Comments 1948, May 1996.

  16. L. Joncheray, "A Simple Active Attack Against TCP," Proceedings of the 5th USENIX UNIX Security Symposium, June 1995.



 Python   SQL   Java   php   Perl 
 game development   web development   internet   *nix   graphics   hardware 
 telecommunications   C++ 
 Flash   Active Directory   Windows