|
[1] McAfee Labs 2017 Threats Predictions November 2016. Retrieved from https://www.mcafee.com/ca/resources/reports/rp-threats-predictions-2017.pdf [2] How to Stop a DDoS Attack in Its Tracks (Case Study).(2018). Retrieved from https://kinsta.com/blog/ddos-attack/ [3] Sandeep, Rajneet.(2014,October - December). A Study of DOS & DDOS – Smurf Attack and Preventive Measures. International Journal of Computer Science and Information Technology Research, Vol. 2, Issue 4, 312-317 [4] Hardy, Simon; Dederichs, François (2016) Understanding DoS protection services. Ecole polytechnique de Louvain, Université catholique de Louvain. Retrieved from https://dial.uclouvain.be/memoire/ucl/en/object/thesis:4614 [5] Cite as: Trabelsi, Z., & Ibrahim, W. (2013). A hands-on approach for teaching denial of service attacks: A case study. Journal of Information Technology Education: Innovations in Practice, 12, 299-319. Retrieved from http://www.jite.org/documents/Vol12/JITEv12IIPp299-319Trabelsi1193.pdf [6] Christian Rossow. (2014). Amplification Hell: Revisiting Network Protocols for DDoS Abuse. In Symposium on Network and Distributed System Security (NDSS). Retrieved from https://christian-rossow.de/publications/amplification-ndss2014.pdf [7] M. Prince; CloudFlare, Inc.(March 2013). Retrieved from http://blog.cloudflare.com/the-ddos-that-almost-broke-the-internet [8] Margaret Rouse. (2014). UDP (User Datagram Protocol). SearchNetworking. Retrieved from https://searchnetworking.techtarget.com/definition/UDP-User-Datagram-Protocol [9] Page 39 Suggested Citation:"2 The Domain Name System: Emergence and Evolution." National Research Council. 2005. Signposts in Cyberspace: The Domain Name System and Internet Navigation. Washington, DC: The National Academies Press. doi: 10.17226/11258. Retrieved from https://www.nap.edu/read/11258/chapter/4 [10] Bradley Mitchell. (2019, Nov). What Does Dynamic DNS Mean?. Lifewire. Retrieved from https://www.lifewire.com/definition-of-dynamic-dns-816294 [11] What Exactly Is Secondary DNS?.NS1. Retrieved from https://ns1.com/resources/what-exactly-is-secondary-dns [12] Dig Command in Linux (DNS Lookup). (2020, Feb). Linuxize. Retrieved from https://linuxize.com/post/how-to-use-dig-command-to-query-dns-in-linux/ [13] Nelson Minar. December 9, 1999. A Survey of the NTP Network. MIT Media Lab E15–305 20 Ames Street Cambridge, MA 02139 USA. Retrieved from https://www.eecis.udel.edu/~mills/database/reports/ntp-survey99-minar.pdf [14] Schmidt, Richard. (2017). NTP: Principles of Clock Offset, Network Delay Estimation, and LAN Latency Budgeting. [15] Simple Network Management Protocol (SNMP).Allied Telesis. Retrieved from https://www.allied-telesis.co.jp/support/list/router/ar300/m027400b_pl3_990902/SNMP.pdf [16] Dana Oros.(July 26, 2016). Network Basics: What Is SNMP and How Does It Work?.auvik. Retrieved from https://www.auvik.com/franklymsp/blog/network-basics-what-is-snmp/ [17] SIMPLE NETWORK MANAGEMENT PROTOCOL SATELLAR MANAGEMENT WITH SNMP GET AND SET. (2017). SATEL. Retrieved from https://www.satel.com/wp-content/uploads/2017/08/13.-SATELLAR-and-SNMP-Get-SNMP-Set.pdf [18] THE TFTP PROTOCOL (REVISION 2). July 1992. RFC 1350. Retrieved from https://tools.ietf.org/html/rfc1350 [19] TFTP (Trivial File Transfer Protocol) – File Transfer Protocol made simple.(2019). Digital Guide. Retrieved from https://www.ionos.com/digitalguide/server/know-how/trivial-file-transfer-protocol/ [20] Jonas Lundberg, Ola Flygt. 2009. A TFTP Server. Matematiska och systemtekniska institutionen, MSI, Växjö universitet. Retrieved from http://homepage.lnu.se/staff/oflmsi/DA2402/lab4_1.pdfr [21] File tftp-enum. NMAP. Retrieved from https://nmap.org/nsedoc/scripts/tftp-enum.html [22] tftplist.txt. NMAP. Retrieved from https://github.com/nmap/nmap/blob/master/nselib/data/tftplist.txt
|