Statistical Analysis of Malformed Packets and Their Origins in the Modern Internet (2002)

by Marina Bykova , Shawn Ostermann
Venue:In Proc. of the 2nd ACM SIGCOMM Workshop on Internet measurment
Citations:3 - 0 self

Documents Related by Co-Citation

686 Bro: A System for Detecting Network Intruders in Real-Time – Vern Paxson - 1999
2 A Comparison of SYN Flood Detection Algorithms – M Beaumont-Gay - 2007
37 PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic – Matthew V. Mahoney, Philip K. Chan - 2001
46 Network Traffic Anomaly Detection Based on Packet Bytes – Matthew V. Mahoney - 2003
34 Application of anomaly detection algorithms for detecting SYN flooding attacks – Vasilios A. Siris, Fotini Papagalou - 2004
821 Snort - Lightweight Intrusion Detection for Networks – Martin Roesch, Stanford Telecommunications - 1999
1 Linux IPCHAINS HOWTO". Version 1.0.8 – P Russel - 2000
1 7498 "Information Processing Systems - Open Systems Interconnection - Basic Reference Model – Standard ISO - 1984
1 2001, "An introduction to ARP spoofing – S Whalen - 2001
18 Address Allocation for Private Internets", RFC – Y Rekhter, B Moskowitz, D Karrenberg, G J de Groot, E Lear - 1918
1 ICMP Usage in Scanning: The Complete Know How". http://www'ss-securit'cm/archive/papers/ICMP Scanning v3.0.pdf – O Arkin
1 Behaviour of and requirementsforlnternetfirewalls – N Freed - 2000
1 Firewall and proxy serverHOWTO". Version 0.80 – M Grennan - 2000
13 A Toolkit and Methods for Internet Firewalls – Marcus J. Ranum, Frederick M. Avolio - 1994
2 The /proc Filesystem – Bodo Bauer, Terrehon Bowden - 1999
1 Linux IPCHAINS HOWTO”. Version 1.0.8 – P Russel - 2000
1 Firewall and proxy server HOWTO”. Version 0.80 – M Grennan - 2000
11 An Introduction to ARP Spoofing – Sean Whalen - 2001
26 Behavior of and Requirements for Internet Firewalls – N Freed - 2000