|
[1] Denial of Service Attacks, Cert Coordination Center http://www.cert.org/tech_tips/denial_of_service.html [2] M. Williams, Ebay, Amazon, Buy.com hit by attacks, IDG News Service, 02/09/00 http://www.nwfusion.com/news/2000/0209attack.html [3] R. W. Stevens and G. R. Wright. TCP/IP Illustrated, Volume 2, The Implementation. Prentice-Hall, Englewood Cliffs, New Jersey, 1995 [4] J. Postel. RFC - 791 Internet Protocol. Information Science Institute, University of Southern California, CA, Sept. 1981. [5] J. Postel, editor. RFC - 793 Transmission Datagram Proto-col. Information Sciences Institute, USC, CA, Sept. 1981. [6] CERT/CC. ‘CERT Advisory CA-1999-17 Denial of Service Tools.’’ 3 March 2000. http://www.cert.org/advisories/CA-1999-17.html [7] CERT/CC. ‘Results of the Distributed-Systems Intruder Tools Workshop.’ 2-4 November 1999. http://www.cert.org/reports/dsit_workshop.pdf [8] Dittrich, S. D. Dittrich, and N. Long. ‘ An analysis of the ‘Shaft’ Distributed denial of Service Tool’. 13 March 2000. http://www.sans.org/y2k/shaft.htm [9] Dittrich, David. ‘ The DoS Project’s ‘Trinoo’ distributed denial of service attack tool’. 21 October 1999. http://staff.washington.edu/dittrich/misc/trinoo.analysis [10] Dittrich, David. ‘ The stacheldraht’ distributed denial of service attack tool’. 31 December 1999. http://staff.washington.edu/dittrich/misc/stacheldraht.analysis [11] Dittrich, David. ‘ The Tribe Flood Network’ distributed denial of service attack tool’. 21 October 1999. http://staff.washington.edu/dittrich/misc/ftn.analysis [12] M. Graff. Sun Security Bulletin 00136. Mountain View, CA, Oct. 1996 [13] Computer Emergency Response Team (CERT), Carnegie Mellon University, Pittsburgh, PA. TCP SYN Flooding and IP Spoofing Attacks, Sept. 1996. CA-96:2 [14] Cisco Systems Inc. Defining Strategies to Protect Against TCP SYN Denial of Service Attacks, September 1996 [15] P. Ferguson. Network ingress filtering. Internet draft, Cisco Systems, Inc., September 1996 [16] P. Ferguson, D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Spoofing. RFC 2827 May 2000. [17] Egress Filtering. v 0.2. GIAC Special Notice, SANS Institute Resources, February 2000. [18] Computer Emergency Response Team (CERT), Carnegie Mellon University, Pittsburgh, PA. IP Spoofing Attacks and Hijacked Terminal Connections, Jan. 1995. CA-95:01. [19] C. Schulba, I. Krsul, M. Kuhn, E. Spafford, A. Sundram, D. Zamboni, ‘‘Analysis of a Denial of Service Attack on TCP’’, Proceedings of the 1997 IEEE Symposium on Security and Privacy. [20] Frank Kargl, et. al. Protecting Web Servers from Distributed Denial of Service Attacks. May 2001. [21] Livio Ricciulli, et. al. TCP SYN Flooding Defence, [22] Linux Kernel http://www.kernel.org/ [23] Loadable Kernel Module http://www.tldp.org/HOWTO/Module-HOWTO/ [24] Netfilter & Ipteables http://www.netfilter.org/ [25] W32.Blaster.Worm http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html [26] Ping of Death http://compnetworking.about.com/library/glossary/bldef-pingofdeath.htm [27] Smurf http://www.cert.org/advisories/CA-1998-01.html
|