참고문헌
- Inserti on. Evasion. and Denial of Service: Eluding Network Intrusion Detection Thomas,H.Ptacek;Timothy,N.Newsham
- 50 ways to defeat your intrusion Detection System Fred Cohen
- Passive Mapping: Anoffensive use of IDS Coretez Giovanni
- Multiple Levels of De-synchronization and other concerns with testing an IDS system Greg Hoglund;Jon Gray
- IDS Evasion Techniques and Tactics Kevin Timm
- IDS Evasion with Unicode Eric Hacker
- Re-synchronizing a NIDS Eric Hacker
- Social Engineering: Techniques that can bypass Intrusion Detection Systems Toby Miller
- Secure Networks Insertion, Evasion, and Denial of Service:Eluding Network Intrusion Detection T.Ptacek;T.Newsham
- Internetworking with TCP/IP Volume One. Comer,D.E.
- Phrack Magazine Phrack Magazine Issue 49 Article 6 route
- Phrack Magazine v.8 no.Issue 54 Defeating Sniffers and Intrusion Detection Systems horizon
- Phrack Magazine v.6 no.Issue 49 Loki: ICMP Tunneling, daemon9
- Phrack Magazine v.6 no.Issue 51 LOK12 (the implementation) route
- Firewall Piercing mini-HOWTO Francois Rene Rideau
- Placing Backdoors Throught Firewalls Van Hauser
- Anti-IDS Tool and Tactics Steven Martin
- Defending Against NIDS Evasion using Traffic Normalizers Vern Paxson;Mark Handley
- Non-Executable User Stack Solar Designer
- Bugtraq mailing list Nasty security hole in lprm Chris Evans
- Stack Smashing vulnerabilities in the UNIX Operating System Nothan,P.Smith
- Bugtraq mailing list Defeating Solar Designer Non-Executable Stack Patch Refel Wojtczuk
- Tool Interface Standard(TIS) Executable and Linking Format(ELF) Specification V.1.2 TIS Committee