|
[1] Tobias Oetiker, Dave Rand. “MULTI ROUTER TRAFFIC GRAPHER”, http://people.ee.ethz.ch/~oetiker/webtools/mrtg/
[2] Jeff R. Allen http://cricket.sourceforge.net/
[3] Nicholas Weaver. “A Brief History of The Worm”, INFOCUS, SecurityFocus, November 2001. http://www.securityfocus.com/infocus/1515
[4] CAIDA. “Code-Red Worms: A Global Threat”, CAIDA http://www.caida.org/analysis/security/code-red/index.xml
[5] CAIDA. ” Code-Red: a case study on the spread and victims of an Internet worm”, 2002 Sigcomm/Usenix Internet Measurement Workshop http://www.caida.org/outreach/papers/2002/codered/codered.pdf
[6] Andrew Mackie, Jensenne Roculan, Ryan Russell, and Mario Van Velzen., ”Nimda Worm Analysis”, Incident Analysis Report, SecurityFocus, Septemper 2001. http://aris.securityfocus.com/alerts/nimda/010921-Analysis-Nimda-v2.pdf
[7] David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas Weaver. ”Inside the Slammer Worm” http://www.computer.org/security/v1n4/j4wea.htm
[8] Kevin J. Houle, George M. Weaver. “Trends in Denial of Service Attack Technology”, CERT/CC, October 2001 http://www.cert.org.tw/archive/pdf/DoS_trends.pdf
[9] L. Arent, D. MuCullagh, “A Frenzy of Hacking Attacks”. Wired Online, February 2000. http://www.wired.com/news/business/0,1367,34234,00.html [10] N.Weaver. “WarholWorms: The Potential for Very Fast Internet Plagues”, http://www.cs.berkeley.edu/~nweaver/warhol.html.
[11] Staniford, Stuart, Vern Paxson, and Nicholas Weaver. “How to Own the Internet in Your Spare Time”, Proceedings of the 11th Usenet Security Symposium, San Francisco, CA. 5-9 Aug. 2002. USENIX Association. http://www.usenix.org/publications/library/proceedings/sec02/full_papers/staniford/staniford.pdf
[12] CERT/CC. “CERT Advisory CA-2001-26 Nimda Worm”, Sept. 2001. http://www.cert.org/advisories/CA-2001-26.html
[13] Ruby B. Lee ,“Taxonomies of Distributed Denial of Service Networks, Attacks, Tools, and Countermeasures”. http://ww.ee.princeton.edu/~rblee/DoS%20Survey%20Paper_v7final.doc
[14] http://www.mrtg.org
[15] http://www.ntop.org/ntop.html
[16] http://www.tcpdump.org
[17] http://ipaudit.sourceforge.net
[18] Cisco White Paper. “NetFlow Services and Applications” http://www.cisco.com/warp/public/cc/pd/iosw/ioft/neflct/tech/napps_wp.pdf
[19] Cisco, “NetFlow Services Solutions Guide” http://www.cisco.com/univercd/cc/td/doc/cisintwk/intsolns/netflsol/nfwhite.htm
[20] Dave Plonka,” FlowScan: A Network Traffic Flow Reporting and Visualization Tool” http://net.doit.wisc.edu/~plonka/lisa/FlowScan/out.ps.gz
[21] John-Paul Navarro, Bill Nickless, & Linda Winkler - Argonne National Laboratory, “Combining Cisco NetFlow Exports with Relational Database Technology for Usage Statistics, Intrusion Detection, and Network Forensics”
[22] http://www.splintered.net/sw/flow-tools/
[23] http://net.doit.wisc.edu/~plonka/FlowScan/
[24] Daniel W. McRobb, “cflowd configuration”, 1998-1999. http://www.caida.org/tools/measurement/cflowd/configuration/configuration.html
[25] http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx
|