Information Technology Reference
In-Depth Information
6. Eddy, W.: TCP SYN Flooding Attacks and Common Mitigations. RFC 4987 (In-
formational) (August 2007)
7. Egevang, K., Francis, P.: The IP Network Address Translator (NAT). RFC 1631
(Informational) (May 1994)
8. Fyodor.: Remote OS Detection via TCP/IP Fingerprinting. Phrack Magazine 8
(1998)
9. Fyodor.: Nmap Network Scanning. Insecure.Com LLC (2009)
10. Handley, M., Paxson, V., Kreibich, C.: Network Intrusion Detection: Evasion, Traf-
fic Normalization, and End-to-End Protocol Semantics. In: Proceedings of the 10th
USENIX Security Symposium (2001)
11. Medeiros, J.P.S., Brito, A.M., Pires, P.S.M.: A New Method for Recognizing Op-
erating Systems of Automation Devices. In: Proc. IEEE Conference on Emerging
Technologies & Factory Automation (ETFA 2009), pp. 772-775 (2009)
12. Medeiros, J.P.S., Brito, A.M., Pires, P.S.M.: An Effective TCP/IP Fingerprint-
ing Technique Based on Strange Attractors Classification. In: Garcia-Alfaro, J.,
Navarro-Arribas, G., Cuppens-Boulahia, N., Roudier, Y. (eds.) DPM 2009. LNCS,
vol. 5939, pp. 208-221. Springer, Heidelberg (2010)
13. Medeiros, J.P.S., Brito, A.M., Pires, P.S.M.: Using Intelligent Techniques to Extend
the Applicability of Operating System Fingerprint Databases. Journal of Informa-
tion Assurance and Security 5(1), 554-560 (2010)
14. Medeiros, J.P.S., Cunha, A.C., Brito Jr., A.M., Motta Pires, P.S.: Application
of Kohonen Maps to Improve Security Tests on Automation Devices. In: Lopez,
J., Hammerli, B.M. (eds.) CRITIS 2007. LNCS, vol. 5141, pp. 235-245. Springer,
Heidelberg (2008)
15. Medeiros, J.P.S., dos Santos, S.R., Brito, A.M., Pires, P.S.M.: Advances in Net-
work Topology Security Visualisation. International Journal of System of Systems
Engineering 1(4), 387-400 (2009)
16. Postel, J.: Transmission Control Protocol. RFC 793 (Standard) (September 1981)
17. Provos, N.: Honeyd (May 2007), http://www.honeyd.org/ (version 1.5c)
18. Provos, N., Holz, T.: Virtual Honeypots: From Botnet Tracking to Intrusion De-
tection. Addison-Wesley, Reading (2008)
19. Smart, M., Malan, G., Jahanian, F.: Defeating TCP/IP stack fingerprinting. In:
Proceedings of the 9th USENIX Security Symposium (2000)
20. Srisuresh, P., Egevang, K.: Traditional IP Network Address Translator (Traditional
NAT). RFC 3022 (Informational) (January 2001)
21. Zalewski, M.: Strange Attractors and TCP/IP Sequence Number Analysis. Tech.
rep., Coredump (2001)
22. Zalewski, M.: Strange Attractors and TCP/IP Sequence Number Analysis - One
Year Later. Tech. rep., Coredump (2002)
 
 
Search WWH ::




Custom Search