Information Technology Reference
In-Depth Information
It is believed that evolved versions of the technique will take advantage of
these small improvements to enable the uncomplicated passive external surveil-
lance of private networks — despite the anonymizing effects of NATs and HTTP
proxies.
References
1. Clarke, F., Ekeland, I.: Nonlinear oscillations and boundary-value proeblems for
Hamiltonian systems. Arch. Rat. Mech. Anal. 78 (1982) 315-333
2. Clinton Wong: HTTP Pocket Reference. O'Reilly, July 30 (2000)
3. Gourley, David et al.: HTTP: The Definitive Guide. O'Reilly, Cambridge, September
(2002)
4. Bellovin, S.M.: A Technique for Counting NATed Hosts. www.research.att.com/
smb/papers/fnat.pdf, AT&T Labs Reseach (2003)
5. Berendt, B., Mobasher, B., Spiliopoulou, M.: Web Usage Mining for E-Business
Applications. ECML/PKDD-2002, 19 August (2002)
6. Snort IDS. http://www.snort.org/about.html
7. MySQL. http://www.mysql.com/
8. MySQL++. http://tangentsoft.net/mysql++/
9. TCPdump. http://tcpdump.org/
Search WWH ::




Custom Search