On Reconnaissance with IPv6: A Pattern-Based Scanning Approach
暂无分享,去创建一个
[1] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[2] J. Alex Halderman,et al. Analysis of the HTTPS certificate ecosystem , 2013, Internet Measurement Conference.
[3] Edgar R. Weippl,et al. IPv6 Security: Attacks and Countermeasures in a Nutshell , 2014, WOOT.
[4] Tim Chown,et al. RFC 5375: IPv6 Unicast address assignment considerations , 2008 .
[5] J. Alex Halderman,et al. An Internet-Wide View of Internet-Wide Scanning , 2014, USENIX Security Symposium.
[6] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[7] Tim Chown,et al. IPv6 Unicast Address Assignment Considerations , 2008, RFC.
[8] Dmitri Loguinov,et al. Demystifying service discovery: implementing an internet-wide scanner , 2010, IMC '10.
[9] Christian Rossow,et al. Amplification Hell: Revisiting Network Protocols for DDoS Abuse , 2014, NDSS.
[10] Eric Wustrow,et al. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices , 2012, USENIX Security Symposium.
[11] Christian Rossow,et al. Exit from Hell? Reducing the Impact of Amplification DDoS Attacks , 2014, USENIX Security Symposium.
[12] Fernando Gont. A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC) , 2014, RFC.
[13] Stephen E. Deering,et al. Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.
[14] Fernando Gont,et al. Network Reconnaissance in IPv6 Networks , 2016, RFC.
[15] David Malone. Observations of IPv6 Addresses , 2008, PAM.
[16] Vern Paxson,et al. The Matter of Heartbleed , 2014, Internet Measurement Conference.
[17] Eric Wustrow,et al. ZMap: Fast Internet-wide Scanning and Its Security Applications , 2013, USENIX Security Symposium.
[18] Tim Chown,et al. IPv6 Implications for Network Scanning , 2008, RFC.