Network Traffic Analysis Using tcpdump Reference Material
Reference Material
W. Richard Stevens, TCP/IP Illustrated, Volume 1 The
Protocols, Addison-Wesley
Eric A. Hall, Internet Core Protocols, O’Reilly
Craig H. Rowland, “Covert Channels in the TCP/IP Protocol Suite”,
www.psionic.com/papers/covert/covert.tcp.txt
Ofir Arkin, “ICMP Usage in Scanning”, www.sys-security.com
Fyodor, “Remote OS detection via TCP/IP Stack FingerPrinting”
www.insecure.org/nmap/nmap-fingerprinting-article
Thomas Ptacek, Timothy Newsham, “Insertion, Evasion, and Denial of Service:
Eluding Network Intrusion Detection”, www.robertgraham.com/
mirror/Ptacek-Newsham-Evasion-98.html
Rain Forest Puppy, “A look at whisker’s anti-IDS tactics”, www.wiretrip.net/rfp...