HostedDB - Dedicated UNIX Servers

index_203
   UNCLASSIFIED Testing and Security Validation Version 1.0g  UNCLASSIFIED 203   6.4.  References Web Sites and On-Line Resources [1]    “Improving Security on Cisco Routers”, Cisco Technical Tips,   Cisco Systems, 1999. available at: http://www.cisco.com/warp/public/707/21.html    [2]    “Characterizing and Tracing Packet Floods Using Cisco Routers”,   Cisco Technical Tips, Cisco Systems, 2000. available at: http://www.cisco.com/warp/public/707/22.html [3]    “Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks”,   Cisco White Papers, Cisco Systems, 2000.   available at: http://www.cisco.com/warp/public/707/newsflash.html   [4]    “Defining Strategies to Protect Against TCP SYN Denial of Service Attacks”, Cisco White Papers, Cisco Systems, 1999.   available at: http://www.cisco.com/warp/public/707/4.html   [5]    “Denial of Service Attacks”, CERT Coordination Center, Software Engineering Institute, 1997.   available at: http://www.cert.org/tech_tips/denial_of_service.html [6]    “Distributed Denial of Service Tools”, CERT Incident Note IN-99-07, CERT Coordination Center, Software Engineering Institute, 1999.   available at: http://www.cert.org/incident_notes/IN-99-07.html [7]    “Topic: TCP SYN Flooding and IP Spoofing Attacks”, CERT Advisory CA96.21, CERT Coordination Center, Software Engineering Institute, 1996. available at: http://www.cert.org/advisories/CA96.21.tcp_syn_flooding.html [8]    “Distributed Attack Tools”, Packet Storm, Securify Inc, 2000. available at: http://packetstorm.securify.com/distributed [9]    Huegens, C. “The Latest in Denial of Service Attacks: Smurfing”, 2000. available from: http://www.pentics.net/denial-of-service/ Additional Exploit Pages http://packetstorm.securify.com/exploits/DoS http://packetstorm.securify.com/spoof/spoofit/IP-spoof1.c Additional General Exploit Information sites: http://www.rootshell.com http://www.securityfocus.com