Original SYN: Finding machines hidden behind firewalls
暂无分享,去创建一个
[1] m. morbitzer,et al. Master ' s Thesis TCP Idle Scans in IPv 6 , 2013 .
[2] 2015 IEEE Conference on Computer Communications, INFOCOM 2015, Kowloon, Hong Kong, April 26 - May 1, 2015 , 2015, IEEE Conference on Computer Communications.
[3] Stuart Staniford-Chen,et al. Practical Automated Detection of Stealthy Portscans , 2002, J. Comput. Secur..
[4] Joanne Treurniet,et al. A Network Activity Classification Schema and Its Application to Scan Detection , 2011, IEEE/ACM Transactions on Networking.
[5] B. Soniya,et al. Detection of TCP SYN Scanning Using Packet Counts and Neural Network , 2008, 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems.
[6] Carrie Gates,et al. Coordinated Scan Detection , 2009, NDSS.
[7] Jian Li,et al. The research and implementation of intelligent intrusion detection system based on artificial neural network , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).
[8] Joseph B. Kadane,et al. Scan Detection on Very Large Networks Using Logistic Regression Modeling , 2006, 11th IEEE Symposium on Computers and Communications (ISCC'06).
[9] Hari Balakrishnan,et al. Fast portscan detection using sequential hypothesis testing , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[10] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[11] Marco de Vivo,et al. A review of port scanning techniques , 1999, CCRV.
[12] Sameer Seth,et al. TCP/IP architecture, design, and implementation in Linux , 2008 .
[13] Gordon Fyodor Lyon,et al. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .
[14] Yinglian Xie,et al. Collaborative TCP sequence number inference attack: how to crack sequence number under a second , 2012, CCS '12.
[15] Hongsuda Tangmunarunkit,et al. Scaling of multicast trees: comments on the Chuang-Sirbu scaling law , 1999, SIGCOMM '99.
[16] Kwan-Liu Ma,et al. Interactive Visualization for Network and Port Scan Detection , 2005, RAID.
[17] Jeffrey Knockel,et al. Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels , 2014, PAM.
[18] Deepak Kapur,et al. Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking , 2010, USENIX Security Symposium.
[19] Zhuoqing Morley Mao,et al. Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security , 2012, 2012 IEEE Symposium on Security and Privacy.
[20] Kotagiri Ramamohanarao,et al. A probabilistic approach to detecting network scans , 2002, NOMS 2002. IEEE/IFIP Network Operations and Management Symposium. ' Management Solutions for the New Communications World'(Cat. No.02CH37327).
[21] Dawn Xiaodong Song,et al. Distributed Evasive Scan Techniques and Countermeasures , 2007, DIMVA.
[22] Steven M. Bellovin,et al. A technique for counting natted hosts , 2002, IMW '02.
[23] Carrie Gates,et al. Co-ordinated port scans: a model, a detector and an evaluation methodology , 2006 .
[24] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[25] Donald F. Towsley,et al. Exploiting the IPID Field to Infer Network Path and End-System Characteristics , 2005, PAM.