5[5]A.Dowling,J.G.Keating.A proxy-based security architecture for Intemet applications in an extranet environment.Journal of Systems and Software.Sep.2001. 被引量:1
6[6]CERT ADVISORY.TCP SYN Flooding and IP Spoofing Attacks.CA-96-21,Sept.1996. 被引量:1
7[7]CERT ADVISORY.IP Spoofing Attacks and Hijacked Terminal connections.CA-95-01,1995. 被引量:1
8[8]S.Bellovin.Defending Against Sequence Number Atacks.IETF RFC1948.May 1996. 被引量:1