-
"A Security Review of Protocols: Lower Layers,"by S.M. Bellovin, et al. (http://www.InformIT.com)
-
"Security Problems in the TCP/IP Protocol Suite," by S.M. Bellovin. Computer Communication Review , Vol. 19, No. 2, pp. 32-48. April 1989
-
"Overcoming IPv6 Security Threat," by Joe Baptista. (http://www.circleid.com)
-
"An Analysis of Fragmentation Attacks," by Jason Anderson. (http://www.sans.org)
-
"Defining Strategies to Protect Against TCP SYN Denial of Service Attacks." (http://www.cisco.com)
-
"IP-Spoofing Demystified." daemon9 / route / infinity. (http://www.phrack.org)
-
RFC 768. "User Datagram Protocol," August 1980.
-
RFC 791. "Internet Protocol, DARPA Internet Program, Protocol Specification," September 1981.
-
RFC 792. "Internet Control Message Protocol, DARPA Internet Program, Protocol Specification," September 1981.
-
RFC 793. "Transmission Control Protocol, DARPA Internet Program, Protocol Specification," September 1981.
-
RFC 826. "An Ethernet Address Resolution Protocol," November 1982.
-
RFC 951. "Bootstrap Protocol (BOOTP)," September 1985.
-
"Covert channels in the TCP/IP protocol suite," by Craig H. Rowland. (http://www.firstmonday.dk/issues/issue2_5/rowland/)
-
"Syn Cookies," by D. J. Bernstein. (http://cr.yp.to/syncookies.html)
-
RFC 3041. "Privacy Extensions for Stateless Address Autoconfiguration in IPv6," January 2001.
-
Airscanner Mobile Sniffer User's Manual , by Seth Fogie and Cyrus Peikari. (http://www.airscanner.com)
-
Internet Core Protocols: The Definitive Reference , by Eric A. Hall. O'Reilly, 2000.
-
"How does Fragroute evade NIDS detection?" by Michael Holstein. (http://www.sans.org)