Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
暂无分享,去创建一个
[1] Mike St. Johns. Authentication server , 1985, RFC.
[2] Alfonso Valdes,et al. Live Traffic Analysis of TCP/IP Gateways , 1998, NDSS.
[3] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[4] J. P. Ed,et al. Transmission control protocol- darpa internet program protocol specification , 1981 .
[5] Charles E. Kahn,et al. A common intrusion detection framework , 2000 .
[6] Van Jacobson,et al. TCP Extensions for High Performance , 1992, RFC.
[7] Vern Paxson,et al. End-to-end Internet packet dynamics , 1997, SIGCOMM '97.
[8] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[9] Karl N. Levitt,et al. GrIDS A Graph-Based Intrusion Detection System for Large Networks , 1996 .
[10] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[11] Jon Postel,et al. Internet Protocol , 1981, RFC.
[12] Biswanath Mukherjee,et al. A Methodology for Testing Intrusion Detection Systems , 1996, IEEE Trans. Software Eng..
[13] Laurent Joncheray. A Simple Active Attack Against TCP , 1995, USENIX Security Symposium.