Professional Documents
Culture Documents
Attack
REFERENCES
[1] W. Ren and H. Jin, “Modeling the network forensics behaviors,”
Proc.1st Int’l Conf. Security and Privacy for Emerging Areas in.
Communication Networks (SecureComm 2005), Sept., 2005, pp. 1–8
[2] R. Chnadran, “Network Forensics”, in Know Your Enemy:
Learning about Security Threats, Ed. L. Spitzner, Second Edition,
Addison Wesley Professional, 2004, pp 281 – 325.
[3] A white paper on, “Examining port scan methods- Analyzing Audible
Techniques”. Internet:
http://www.windowsecurity.com/whitepapers/Examining_port_scan_me
thods__Analyzing_Audible_Techniques_.html.[Last accessed: March
30, 2011].
[4] Portscanningmethods[online]avalilablehttp://nmap.org/book/man-
port-scanning-techniques.html [Last accessed: March 5, 2011].
[5] Wikipedia website [online] available:
http://en.wikipedia.org/wiki/Tcpdump [Last accessed: March 30, 2011].
[6] Tcpdump , www.tcpdump.org.
[7] Python tutorial, www.tutorialspoint.com/python/index.html.
[8] Kaushik, A.K.; Pilli, E.S.; Joshi, R.C.; , "Network forensic system
for port scanning attack," Advance Computing Conference (IACC),