Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (66.41 KB, 13 trang )
1
1
Network Traffic Analysis
Using tcpdump
Judy Novak
Judy Novak
Johns Hopkins University Applied Physics Laboratory
Reference Material
All material Copyright Novak, 2000, 2001. All rights reserved.
2
2
References
This page intentionally left blank.
3
3
Reference Material
W. Richard Stevens, TCP/IP Illustrated, Volume 1 The
Protocols, Addison-Wesley
Eric A. Hall, Internet Core Protocols
, O’Reilly
Craig H. Rowland, “Covert Channels in the TCP/IP Protocol Suite”,
www.psionic.com/papers/covert/covert.tcp.txt
Ofir Arkin, “ICMP Usage in Scanning”, www.sys-security.com
Fyodor, “Remote OS detection via TCP/IP Stack FingerPrinting”
www.insecure.org/nmap/nmap-fingerprinting-article
Thomas Ptacek, Timothy Newsham, “Insertion, Evasion, and Denial of Service:
Eluding Network Intrusion Detection”, www.robertgraham.com/
mirror/Ptacek-Newsham-Evasion-98.html
Rain Forest Puppy, “A look at whisker’s anti-IDS tactics”, www.wiretrip.net/rfp
This page intentionally left blank.