[1] The United States Computer Emergency Readiness Team, at http://www.us-cert.gov.

[2] J. Mirkovic and P. Reiher, “A Taxonomy of DDoS Attack and DDoS Defense Mechanisms,” ACM Computer Communications Review 34, No. 2 (April 2004), pp. 39–53.

[3] D. Moore, C. Shannon, and K. Claffy, “Code Red: A Case Study on the Spread and Victims of an Internet Worm,” Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement (IMW), Marseille, France, 2002, pp. 273–284.

[4] Z. Chen, L. Gao, and K. Kwiat, “Modeling the Spread of Active Worms,” Proceedings of IEEE Infocom, San Franciso, CA, April 2003.

[5] Richard Bejtlich, The Tao of Network Security Monitoring (Boston: Addison-Wesley, 2004).

[6] W. Stallings, Network Security Essentials, 2nd ed. (Englewood ...

Get Information Assurance now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.