6.17 References

 <  Day Day Up  >  

  • "A Security Review of Protocols: Lower Layers,"by S.M. Bellovin, et al. (http://www.InformIT.com)

  • "Security Problems in the TCP/IP Protocol Suite," by S.M. Bellovin. Computer Communication Review , Vol. 19, No. 2, pp. 32-48. April 1989

  • "Overcoming IPv6 Security Threat," by Joe Baptista. (http://www.circleid.com)

  • "An Analysis of Fragmentation Attacks," by Jason Anderson. (http://www.sans.org)

  • "Defining Strategies to Protect Against TCP SYN Denial of Service Attacks." (http://www.cisco.com)

  • "IP-Spoofing Demystified." daemon9 / route / infinity. (http://www.phrack.org)

  • RFC 768. "User Datagram Protocol," August 1980.

  • RFC 791. "Internet Protocol, DARPA Internet Program, Protocol Specification," September 1981.

  • RFC 792. "Internet Control Message Protocol, DARPA Internet Program, Protocol Specification," September 1981.

  • RFC 793. "Transmission Control Protocol, DARPA Internet Program, Protocol Specification," September 1981.

  • RFC 826. "An Ethernet Address Resolution Protocol," November 1982.

  • RFC 951. "Bootstrap Protocol (BOOTP)," September 1985.

  • "Covert channels in the TCP/IP protocol suite," by Craig H. Rowland. (http://www.firstmonday.dk/issues/issue2_5/rowland/)

  • "Syn Cookies," by D. J. Bernstein. (http://cr.yp.to/syncookies.html)

  • RFC 3041. "Privacy Extensions for Stateless Address Autoconfiguration in IPv6," January 2001.

  • Airscanner Mobile Sniffer User's Manual , by Seth Fogie and Cyrus Peikari. (http://www.airscanner.com)

  • Internet Core Protocols: The Definitive Reference , by Eric A. Hall. O'Reilly, 2000.

  • "How does Fragroute evade NIDS detection?" by Michael Holstein. (http://www.sans.org)

 <  Day Day Up  >  


Security Warrior
Security Warrior
ISBN: 0596005458
EAN: 2147483647
Year: 2004
Pages: 211

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net