Insertion, evasion, and denial of service: Eluding network intrusion detection (1998)

by Thomas H. Ptacek , Timothy N. Newsham
Citations:281 - 0 self

Active Bibliography

3 TCP/IP on Gigabit Networks – Stephen Pink
105 Experience with EMERALD to Date – Peter G. Neumann, Phillip A. Porras - 1999
16 The Use of Information Retrieval Techniques for Intrusion Detection – Ross Anderson, Abida Khattak - 1998
Performance Evaluation of Energy Efficient Communication Protocol for Mobile Ad Hoc Networks – Toshihiko Sasama, Kentaro Kishida, Kazunori Sugahara, Hiroshi Masuyama
11 S-ARP: a secure address resolution protocol – D. Bruschi, A. Ornaghi, E. Rosti - 2003
RFC1693 Page 1 of 37 – Network Working Group, P. Conrad
Special Issue on Wireless Access to the Global Internet: Mobile Radio Networks and Satellite Systems – Maximising Single Connection, Nedo Cel, Francesco Potortì
1 TCP Performance in a Geostationary Satellite Environment – Daniel R. Glover, Hans Kruse - 1998
12 An Extension to TCP: Partial Order Service – T. Connolly, P. Amer, P. Conrad - 1994
Status of This Memo An Extension to TCP: Partial Order Service – T. Connolly, P. Amer, P. Conrad - 1994
9 Maximising single connection TCP goodput by trading bandwidth for BER – Nedo Celandroni, Francesco Potorti - 2003
Network Working Group K. Lougheed Request for Comments: 1163 cisco Systems Obsoletes: RFC 1105 Y. Rekhter T.J. Watson Research Center, IBM Corp June 1990 A Border Gateway Protocol (BGP) – Status Of This
24 Experimental Evaluation of SunOS IPC and TCP/IP Protocol Implementation – Christos Papadopoulos, Gurudatta M. Parulkar - 1993
Border Gateway Protocol in the Internet", define a Proposed Standard – K. Lougheed, Y. Rekhter - 1990
6 Remote Network Monitoring MIB Protocol Identifier Macros", RFC 2896, August 2000. 8. IANA Considerations The protocols identified in this specification are almost entirely defined in external documents. In some rare cases, an arbitrary Protocol Identifier – A. Bierman, C. Bucci, R. Iddon
3 Malicious attacks on ad hoc network routing protocols – Po-wah Yau, Shenglan Hu, Chris J. Mitchell
Network Working Group R. Braden Request for Comments: 1337 ISI May 1992 TIME-WAIT Assassination Hazards in TCP – Status Of This
3 An Intrusion Tolerance Approach for Protecting Network Infrastructures – Steven Cheung - 1999
2 Antigone: Implementing Policy in Secure Group Communication – Patrick McDaniel , Atul Prakash - 2000