Home > Articles > Security > Network Security

  • Print
  • + Share This
This chapter is from the book


  1. Dr. Vesselin Bontchev, personal communication, 2004.

  2. Nick FitzGerald, "When Love Came to Town," Virus Bulletin, June 2000, pp. 6-7.

  3. Donn Seeley, "A Tour of the Worm," USENIX Conference, 1989, pp. 287-304.

  4. Frederic Perriot and Peter Szor, "An Analysis of the Slapper Worm Exploit," Symantec Security Response, White Paper, April 2003, http://www.sarc.com/avcenter/whitepapers.html.

  5. "The Cheese Worm," CERT Incident Note IN-2001-05, http://www.cert.org/incident_notes/IN-2001-05.html.

  6. "The sadmind/IIS worm," CERT Advisory CA-2001-11, http://www.cert.org/advisory/CA-2001-11.html.

  7. Alexsander Czarnowski, "Distributed DoS Attacks—Is the AV Industry Ready?" Virus Bulletin Conference, 2000, pp. 133-142.

  8. Ido Dubrawsky, "Effects of Worms on Internet Routing Stability," Security Focus, June 2003, http://www.securityfocus.com/infocus/1702.

  9. Frederic Perriot, "Crack Addict," Virus Bulletin, December 2002, pp. 6-7, http://www.virusbtn.com/resources/viruses/indepth/opaserv.xml.

  10. National Bureau of Standards, "Data Encryption Standard," FIPS Publication 46, U.S. Department of Commerce, 1977.

  11. Electronic Frontier Foundation, "Cracking DES," Sebastopol, CA, 1998, ISBN: 1-56592-520-3 (Paperback).

  12. Dr. Steve R. White, "Covert Distributed Processing with Computer Viruses," Advances in Cryptology—CRYPTO '89, Springer-Verlag, 1990, pp. 616-619.

  13. Vesselin Bontchev, "Anatomy of a Virus Epidemic," Virus Bulletin Conference, 2001, pp. 389-406.

  14. Eugene H. Spafford, "The Internet Worm Program: An Analysis," 1988.

  15. Katrin Tocheva, "Worming the Internet—Part 2," Virus Bulletin, November 2001, pp. 12-13.

  16. Peter Ferrie, "Sleep-Inducing," Virus Bulletin, April 2003, pp. 5-6.

  17. Katrin Tocheva, Mikko Hypponen, and Sami Rautiainen, "Melissa," March 1999, http://www.f-secure.com/v-descs/melissa.shtml.

  18. Peter Ferrie, "Magisterium Abraxas," Virus Bulletin, May 2001, pp. 6-7.

  19. Gabor Szappanos and Tibor Marticsek, "Patriot Games," Virus Bulletin, July 2004, pp. 6-9.

  20. Peter Ferrie and Peter Szor, "Sircamstantial Evidence," Virus Bulletin, September 2001, pp. 8-10.

  21. Dmitry O. Gryaznov, "Virus Patrol: Five Years of Scanning the Usenet," Virus Bulletin Conference 2002, pp. 195-198.

  22. Peter Szor, "Parvo—One Sick Puppy?" Virus Bulletin, January 1999, pp. 7-9.

  23. Atli Gudmundsson and Andre Post, "W32.Toal.A@mm," http://securityresponse.symantec.com/avcenter/venc/data/w32.toal.a@mm.html.

  24. Peter Szor, "Happy Gets Lucky?" Virus Bulletin, April 1999, pp. 6-7.

  25. Stuart McClure, Joel Scambray, and George Kurtz, "Hacking Exposed: Network Security Secrets and Solutions," 3rd Edition, Osborn/McGraw-Hill, Berkeley, 2001, ISBN: 0-07-219381-6 (Paperback).

  26. Vern Paxson, Stuart Staniford, and Nicholas Weaver, "How to 0wn the Internet in Your Spare Time," http://www.icir.org/vern/papers/cdc-usenix-sec02/.

  27. Neal Hindocha and Eric Chien, "Malicious Threats and Vulnerabilities in Instant Messaging," Symantec Security Response, White Paper, October 2003, http://www.sarc.com/avcenter/whitepapers.html.

  28. "Buffer Overflow in AOL Instant Messenger," http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0005.

  29. Sergei Shevchenko, "W32.Taripox.A@mm," February 2002, http://securityresponse.symantec.com/avcenter/venc/data/w32.taripox@mm.html.

  30. Katrin Tocheva and Erdelyi Gergely, "Aplore," April 2002, http://www.f-secure.com/v-descs/aplore.shtml.

  31. Marious van Oers, "Digital Rivers of Babylonia," Virus Bulletin, February 2000, pp. 6-7.

  32. Ronald L. Rivest, Adi Shamir, and Leonard Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, v-21, n-2, February 1978, pp. 120-126.

  33. Andrew "bunnie" Huang, "Hacking the Xbox," Xenatera LLX, San Francisco, 2003, ISBN: 1-59327-029-1.

  34. Nick Fitzgerald, personal communication, 2001.

  35. Sen Hittel, "Modap OpenSSL Worm Analysis," Security Focus, September 16, 2002.

  36. Dr. Igor Muttik, personal communication, 2004.

  37. Vesselin Bontchev, "Are 'Good' Computer Viruses Still a Bad Idea?" EICAR, 1994, pp. 25-47.

  38. Heather Shannon, Symantec Security Response, personal communication, 2004.

  39. Edward Fredkin, "On the Soul," 2000, Draft Paper, http://www.digitalphilosophy.org/on_the_soul.htm.

  40. Peter Ferrie and Peter Szor, "Cabirn Fever," Virus Bulletin, August 2004, pp. 4-5, http://pferrie.tripod.com/vb/cabir.pdf.

  41. Ollie Whitehouse, "Redfang: The Bluetooth Device Hunter," 2003.

  42. "WIDCOMM Bluetooth Communication Software Multiple Buffer Overflow Vulnerabilities," http://www.securityfocus.com/bin/10914/discussion.

  43. "Bluetooth Information Disclosure Vulnerability," http://www.securityfocus.com/bin/9024/discussion.

  • + Share This
  • 🔖 Save To Your Account