1. Lu Hui-qin, Zhang Hong, Luo Shou-shan, et al. Denial of service in non-buffer systems. Journal of Beijing University of Posts and Telecommunications, 2003, 26(3): 61-65 (in Chinese)
2. Zhang Wei-bin, Zhang De-yun, Liu Wei-na, et al. Research on protecting against SYN flooding on a firewall. The Journal of China University of Posts and Telecommunications, 2003, 10 (4): 95-100
3. Henry Y X, Lee C J. A source address filtering firewall to defend against denial of service attacks. Proceedings of IEEE 60th Vehicular Technology Conference: Vol 5, Sep 26-29, 2004, Los Angeles, CA, USA. Piscataway, NJ, USA: IEEE, 2004: 3296-3300
4. V Santiraveewan, Y Permpoontanalarp. A graph-based methodology for analyzing IP spoofing attack. Proceedings of 18th International Conference on Advanced Information Networking and Applications: Vol 2, Mar 29-31, 2004, Fukuoka Japan. Piscataway, NJ, USA: IEEE Computer Society, 2004: 227-230
5. Subramanya S R, Lakshminarasimhan N. Computer viruses. Potentials IEEE, 2001, 20(4): 16-19
6. InSeon Yoo, Ulrich Ultes-Nitsche. An intelligent firewall to detect novel attacks. Proceedings of Conference on Korean Science and Engineering Association in UK, Jan 22, 2002, Surrey, Korean(KSEAUK). 2002
7. httptunnel. [2005-10-23]. http://www.nocrew.org/software/httptunnel. html
8. Fyodor. Namp Security. [2005-09-15]. http://www.insecure.org/nmap/ index.html
9. Chris McNab. Network security assessment: know your network. [2006-02-07]. http://www.oreilly.com/catalog/networksa/chapter/ ch04.pdf
10. Gouda M G, Liu X Y A. Firewall Design: Consistency, Completeness, and Compactness. Proceeding of 24th International Conference on Distributed Computing Systems, Mar 24 X Y A 26, 2004, Tokyo, Japan. Piscataway, NJ, USA: IEEE, 2004: 320-327
11. Loose Source Routing. [2006-01-23]. http://www.synacklabs.net/ OOB/ LSR.html
12. Comer D E, Stevens D L. Internetworking with TCP/IP: Vol 2. Upper Saddle River, NJ, USA: Prentice Hall, 2000
14. Comer D E, Stevens D L. Internetworking with TCP/IP: Vol 1. Upper Saddle River, NJ, USA: Prentice Hall, 1998
15. Lyu M R, Lau L K Y. Firewall security: policies, testing and performance evaluation. Proceeding of 24th Computer Software and Applications Conference(COMPSAC 2000), Oct 25 D L 27, 2000. Taibei, China. Los Alamitos, CA, USA: IEEE Computer Society, 2000: 116-121 |