Pretesis Es 98bibliografia PDF
Pretesis Es 98bibliografia PDF
Pretesis Es 98bibliografia PDF
BIBLIOGRAFÍA
[RH91] J. Rifà i Coma, LL. Huguet i Rotger, “Comunicación digital”, Masson S.A, 1991.
[CB94] William R. Cheswick and Steven M. Bellovin, “Firewalls and Internet Security: Repelling the
Wily Hacker", Addison-Wesley Publishing, 1994.
[Rif95] J. Rifà i Coma, “Seguretat Computacional”, Materials, Servei de publicacions UAB, 1995.
[CZ95] D. Brent Chapman, Elizabeth D. Zwicky, “Building Internet Firewalls”, O’Reilly, 1995.
[Far96] Dan Farmer, “Security survey of key Internet hosts & various semirelevant reflections”,
[WWW9], 1996.
[Sch96] Bruce Schneier, “Applied Cryptography”, John Wiley & Sons, 1996.
[Hui98] Christian Huitema, “IPv6: The new Internet Protocol”, Prentice-Hall, 1998.
[Dit99] David Dittrich, “The DOS project’s TRINOO distributed denial of service attack tool”,
[WWW10], 1999.
[Dit99-2] David Dittrich, “The STACHELDRAHT distributed denial of service attack tool”,
[WWW11], 1999.
[Dit99-3] David Dittrich, “The TRIBE FLOOD NETWORK distributed denial of service attack
tool”, [WWW12], 1999.
[Nor99] Stephen Northcutt, “Network Intrusion Detection: An analyst’s handbook”, New raiders,
1999.
59
http://tau.uab.es/~gaby Gabriel Verdejo Alvarez – “Bibliografía”
[DDL00] Sven Dietrich, David Dittrich, Neil Long, “An analysis of the SHAFT distributed denial of
service tool”, [WWW14], 2000.
[Hoe00] David Hoelzer, “Intrussion Detection FAQ: Why Egress Filtering Can Benefit Your
Organization”, [WWW46], 2000.
[MOV01] Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, “Handbook of applied
cryptography”, CRC Press, 2001.
[Sch00] Bruce Schneier, “Secrets and lies: Digital security in a networked world”, John Wiley &
Sons, 2000.
[Ver00] Gabriel Verdejo Alvarez, “El protocolo IPv6 y sus extensiones de seguridad IPSec”, proyecto
final de carrera en ingeniería superior en informática (UAB), [WWW5], 2000.
[GP01] T. M. Gil, M. Poletto, ”MULTOPS: a data-structure for bandwidth attack detection”, 10th
Usenix Security Symposium, 2001.
[Obr01] Eric O’Brien, “Netbouncer: A practical client-legitimacy-based DDOS defense via ingress
filtering”, [WWW15], 2001.
[Ver01] Gabriel Verdejo Alvarez, “DDOS: Ataques de denegación de servicio distribuidos”, trabajo de
curso de doctorado en el departamento de CCD de la UAB, [WWW5], 2001.
[VM01] John Viega, Gary McGraw, “Building Secure Software: How to Avoid Security Problems the
Right Way”, Addison-Wessley, 2001.
[BK02] Seymour Bosworth, Michel E. Kabay ,”Computer Security Handbook”, John Wiley & Sons
Inc., 2002.
[Gib02] Steve Gibson, “DRDoS: Distributed Reflection Denial of Service”, [WWW16], 2002.
[Mah02] R. Mahajan et al., “Controlling high bandwidth aggregates in the network.”, ACM Computer
Communications Review, 2002.
[Bur03] Mariusz Burdach, “Hardening the TCP/IP snack to SYN attacks”, [WWW38], 2003.
[Des03] Neil Desai, “Intrusion prevention systems: The next step in the evolution of IDS”,
[WWW17], 2003.
[FS03] Niels Ferguson, Bruce Schneier, “Practical Cryptography”, John Wiley & Sons, 2003.
[MP03] Jelena Mirkovic, Peter Reiher, “A taxonomy of DDOS attacks and defense mechanisms”,
ACM [WWW40], 2003.
[MP03-1] Jelena Mirkovic, Peter Reiher, “Attacking DDOS at the source”, [WWW19], 2003.
[MP03-2] Jelena Mirkovic, Peter Reiher, “Challenges and principles of DDOS defense”, NCA
[WWW19], 2003.
[Sch03] Carla Schoeder, “Egress filtering: Fencing the bad guys”, [WWW45], 2003.
[UVS+03] Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver, “Cisco Security Specialist's
Guide to PIX Firewall”, Syngress Publishing Inc., 2003.
60
http://tau.uab.es/~gaby Gabriel Verdejo Alvarez – “Bibliografía”
[Ley04] John Leyden, “DDos attacks go through the roof”, The register [WWW41], 2004
[Wat04] Paul A. Watson, “Sleeping in the window: TCP Reset attacks”, CanSecWest, 2004.
61
http://tau.uab.es/~gaby Gabriel Verdejo Alvarez – “Bibliografía”
BIBLIOGRAFÍA WWW
[RFC] http://www.ietf.org/rfc/
http://www.faqs.org/rfcs/index.html
ftp://ftp.rediris.es/pub/rfc
[WWW1] http://www.diccionarios.com
[WWW2] http://www.zakon.org/robert/internet/timeline/
[WWW3] http://www.nua.ie/surveys/how_many_online/
[WWW4] http://www.isc.org/ds/WWW-200301/index.html
[WWW5] http://tau.uab.es/~gaby
[WWW6] http://www.cert.org/stats/cert_stats.html
[WWW7] http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213591,00.html
[WWW8] http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci557336,00.html
[WWW9] http://www.trouble.org/survey/
[WWW10] http://staff.washington.edu/dittrich/misc/trinoo.analysis
[WWW11] http://staff.washington.edu/dittrich/misc/stacheldraht.analysis
[WWW12] http://staff.washington.edu/dittrich/misc/tfn.analysis
[WWW13] http://packetstormsecurity.com/distributed/TFN2k_Analysis-1.3.txt
[WWW14] http://www.sans.org/y2k/shaft.htm
[WWW15] http://www.networkassociates.com/us/_tier0/nailabs/_media/research_projects/development_solutions/netbouncer_presentation.pdf
[WWW16] http://grc.com/dos/drdos.htm
[WWW17] http://www.securityfocus.com/infocus/1670
[WWW18] http://ainac.tgm.ac.at/download/Intro_to_Network_Security_BLarson.ppt
[WWW19] http://www.cs.ucla.edu/~sunshine/publications/
[WWW20] http://securityresponse.symantec.com/avcenter/venc/data/[email protected]
[WWW21] http://www.f-secure.com/v-descs/novarg.shtml
[WWW22] http://www.google.com/press/zeitgeist.html
[WWW23] http://www.cert.org/current/archive/2004/02/17/archive.html
[WWW24] http://www.sco.com/mydoom/
[WWW25] http://www.securityfocus.com/news/7952
62
http://tau.uab.es/~gaby Gabriel Verdejo Alvarez – “Bibliografía”
[WWW26] http://www.theregister.co.uk/2004/01/30/ms_posts_250_000_mydoom/
[WWW27]
http://www.messagelabs.com/viruseye/info/default.asp?virusname=W32%2FMyDoom%2EA%2Dmm&f
rompage=virus+search&fromurl=%2Fviruseye%2Fsearch%2Fdefault%2Easp
[WWW28] http://www.tik.ee.ethz.ch/~ddosvax/mydoom/
[WWW29] ftp://ftp.cs.columbia.edu/nest/
[WWW30] http://www.ccs.neu.edu/home/matta/software.html
[WWW31] http://minnie.tuhs.org/REAL/
[WWW32] http://www.isi.edu/nsnam/ns/
[WWW33] http://dimacs.rutgers.edu/Projects/Simulations/darpa/
[WWW34] http://www.ssfnet.org/homePage.html
[WWW35] http://www.j-sim.org/comparison.html
[WWW36] http://www.ssfnet.org/ssfImplementations.html
[WWW37] http://www.cisco.com/warp/public/707/4.html
[WWW38] http://www.securityfocus.com/infocus/1729
[WWW39] http://www.securityfocus.com/infocus/1674
[WWW40] http://www.cs.ucla.edu/~sunshine/publications/
[WWW41] http://www.theregister.co.uk/2004/02/12/ddos_attacks_go_through/
[WWW42] http://www.uniras.gov.uk/vuls/2004/236929/index.htm
[WWW43] http://www.us-cert.gov/cas/techalerts/TA04-111A.html
[WWW44] http://www.kb.cert.org/vuls/id/498440
[WWW45] http://networking.earthweb.com/netsysm/article.php/2168251
[WWW46] http://www.sans.org/resources/idfaq/egress_benefits.php
[WWW47] http://www.sans.org/y2k/egress.htm
63
http://tau.uab.es/~gaby Gabriel Verdejo Alvarez – “Bibliografía”
64