@BOOK{kn:sto89, AUTHOR={Cliff Stoll}, TITLE={The Cuckoo's Egg}, PUBLISHER={Doubleday}, YEAR=1989 } @BOOK{kn:spa96, AUTHOR={Simson Garfinkel and Eugene H. Spafford}, TITLE={Practical Unix \& Internet Security}, PUBLISHER={O'Reilly \& Associates}, YEAR=1996, MONTH={Abril}, EDITION={2nd} } @INPROCEEDINGS{kn:see89, AUTHOR={Donn Seeley}, TITLE={A Tour of the {W}orm}, BOOKTITLE={Proceedings of 1989 Winter {\sc usenix} Conference}, YEAR=1989, ORGANIZATION={The {\sc usenix} Association}, MONTH={Febrero} } @TECHREPORT{kn:spa88, AUTHOR={Eugene H. Spafford}, TITLE={The {I}nternet {W}orm Program: An Analysis}, INSTITUTION={Purdue University Department of Computer Science}, YEAR=1988, NUMBER={CSD-TR-823}} @TECHREPORT{kn:spa91, AUTHOR={Eugene H. Spafford}, TITLE={The {I}nternet {W}orm Incident}, INSTITUTION={Purdue University Department of Computer Science}, YEAR=1991, NUMBER={CSD-TR-933}} @ARTICLE{kn:spa89, AUTHOR={Eugene H. Spafford}, YEAR=1989, TITLE={The {I}nternet {W}orm: Crisis and Aftermath}, JOURNAL={Communications of the ACM}, VOLUME=32, NUMBER=6, PAGES={678--687}} @INPROCEEDINGS{kn:er89, AUTHOR={M.W. Eichin and J.A. Rochlis}, TITLE={With Microscope and Tweezers: An Analysis of the {I}nternet {V}irus of {N}ovember 1988}, BOOKTITLE={IEEE Security and Privacy}, PAGES={326--343}, YEAR=1989 } @BOOK{kn:den90, AUTHOR={P. Denning}, TITLE={Computers under attack}, PUBLISHER={ACM Press}, YEAR=1990} @BOOK{kn:pfl97, AUTHOR={Charles P. Pfleeger}, TITLE={Security in computing}, PUBLISHER={Prentice Hall}, YEAR=1997} @BOOK{kn:lap91, AUTHOR={J.C. Laprie}, TITLE={Dependability: Basic concepts and terminology}, PUBLISHER={Springer-Verlag}, YEAR=1991} @TECHREPORT{kn:olo92, AUTHOR={Tomas Olovsson}, TITLE={A Structured Approach to Computer Security}, INSTITUTION={Chalmers University of Technology}, YEAR=1992, NUMBER={122}} @BOOK{kn:isv95, AUTHOR={David Icove and Karl Seger and William VonStorch}, TITLE={Computer Crime. A Crimefighter's handbook}, PUBLISHER={O'Reilly \& Associates}, YEAR=1995} @PHDTHESIS{kn:mey89, AUTHOR={Gordon R. Meyer}, TITLE={The Social Organization of the Computer Underground}, SCHOOL={Northern Illinois University}, YEAR=1989} @ARTICLE{kn:lan94, AUTHOR={Carl E. Landwher and Alan R. Bull and John P. McDermott and William S. Choi}, YEAR=1994, TITLE={A Taxonomy of Computer Program Security Flaws, with Examples}, JOURNAL={ACM Computing Surveys}, MONTH={Septiembre}, NUMBER=26, VOLUME=3} @TECHREPORT{kn:aks96, AUTHOR={Taimur Aslam and Ivan Krsul and Eugene H. Spafford}, TITLE={Use of a Taxonomy of Security Faults}, INSTITUTION={Purdue University Department of Computer Science}, YEAR=1996, NUMBER={TR-96-051} } @BOOK{kn:par81, AUTHOR={Donn B. Parker}, YEAR=1981, TITLE={Computer Security Management}, PUBLISHER={Prentice Hall} } @TECHREPORT{kn:ora, KEY={DoD85}, AUTHOR={Sheila L. Brand and others}, TITLE={Department of {D}efense {T}rusted {C}omputer {S}ystem {E}valuation {C}riteria}, INSTITUTION={Department of Defense}, YEAR=1985, MONTH={Diciembre}, NUMBER={DOD 5200.28-STD} } @TECHREPORT{kn:glo, AUTHOR={Sue Berg and others}, KEY={CSC88}, TITLE={Glossary of {C}omputer {S}ecurity {T}erms}, INSTITUTION={National Computer Security Center}, YEAR={1988}, MONTH={Octubre}, NUMBER={NCSC-TG-004} } @INCOLLECTION{kn:rit86, AUTHOR={Dennis M. Ritchie}, BOOKTITLE={UNIX System Manager's Manual, 4.3 BSD, Virtual VAX-11 Version}, TITLE={On the Security of {UNIX}}, PUBLISHER={University of California, Berkeley, CA}, PAGES={17:1--3}, MONTH={Abril}, YEAR=1986 } @ARTICLE{kn:pet98, AUTHOR={Nicholas Petreley}, TITLE={The new {U}nix alters {NT}'s orbit}, JOURNAL={NC World}, MONTH={Abril}, YEAR=1998 } @INCOLLECTION{kn:gal96, AUTHOR={Miguel \'Angel Gallardo}, TITLE={Informatoscopia y Tecnolog\'{\i}a Forense}, BOOKTITLE={\'Ambito Jur\'{\i}dico de las Tecnolog\'{\i}as de la Informaci\'on}, YEAR=1996, PUBLISHER={Consejo General del Poder Judicial}} @BOOK{kn:dav84, AUTHOR={D. W. Davies and W. L. Price}, TITLE={Security for Computer Networks: An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer}, PUBLISHER={John Wiley and Sons}, ADDRESS={New York}, YEAR=1984 } @INCOLLECTION{kn:eve92, AUTHOR={David Everett}, TITLE={Identity Verification and Biometrics}, BOOKTITLE={Computer Security Reference Book}, PUBLISHER={Butterworth-Heinemann}, CHAPTER={10}, PAGES={37--73}, EDITOR={Keith M. Jackson and Jan Hruska}, YEAR=1992 } @BOOK{kn:tan91, AUTHOR={Andrew Tanenbaum}, TITLE={Operating Systems: Design and Implementation}, PUBLISHER={Prentice Hall}, YEAR=1991 } @ARTICLE{kn:mor79, AUTHOR={Robert Morris and Ken Thompson}, YEAR=1979, TITLE={Password Security: A Case History}, JOURNAL={Communications of the ACM}, VOLUME=22, NUMBER=11, MONTH={Noviembre} } @INPROCEEDINGS{kn:fel90, AUTHOR={David C. Feldmeirer and Philip R. Karn}, TITLE={{UNIX} password security - Ten years later}, PAGES={44--63}, BOOKTITLE={CRYPTO89}, EDITOR={G. Brassard}, NOTE={Lecture Notes in Computer Science No.\ 435}, PUBLISHER={Springer-Verlag}, YEAR=1990 } @TECHREPORT{kn:alv88, AUTHOR={Ana Maria de Alvar\'e}, TITLE={How crackers crack passwords, or what passwords to avoid}, YEAR=1988, INSTITUTION={Lawrence Livermore National Laboratory}, MONTH={Septiembre}, NUMBER={UCID-21515} } @INPROCEEDINGS{kn:kle90, AUTHOR={Daniel V. Klein}, TITLE={Foiling the cracker: A survey of, and improvements to, password security}, YEAR=1990, MONTH={Agosto}, BOOKTITLE={Unix Security Workshop}, ORGANIZATION={The {\sc usenix} Association}, PAGES={5--14} } @INPROCEEDINGS{kn:spa91b, AUTHOR={Eugene H. Spafford}, TITLE={{\sc opus}: Preventing weak password choices}, YEAR=1991, MONTH={Octubre}, BOOKTITLE={Proceedings of the 14th National Computer Security Conference}, PAGES={446--455} } @MISC{kn:bel93, AUTHOR={Walter Belgers}, TITLE={Unix Password Security}, YEAR={1993} } @INPROCEEDINGS{kn:bis91, TITLE={A Proactive Password Checker}, AUTHOR={Matt Bishop}, BOOKTITLE={Proceedings of the 7th International Conference on Information Security}, PAGES={150--158}, MONTH={Mayo}, EDITOR={D.T. Lindsay and W.L. Price}, YEAR=1991 } @ARTICLE{kn:bis95, TITLE={Improving System Security via Proactive Password Checking}, AUTHOR={Matt Bishop and Daniel V. Klein}, JOURNAL={Computers \& Security}, NUMBER=3, VOLUME=14, PAGES={233--249}, YEAR=1995 } @INPROCEEDINGS{kn:bis92, TITLE={Anatomy of a Proactive Password Changer}, AUTHOR={Matt Bishop}, BOOKTITLE={Proceedings of {\sc usenix} Unix Security III}, ORGANIZATION={The {\sc usenix} Association}, YEAR=1992 } @MISC{kn:che92, TITLE={Pass or Fail: A New Test for Password Legitimacy}, AUTHOR={Andrew Cherry and Mark W. Henderson and William K. Nickless and Robert Olson and Gene Rackow}, YEAR=1992 } @MISC{kn:kra97, AUTHOR={Robert van Kralingen and Corien Prins and Jan Grijpink}, TITLE={Using your body as a key: legal aspects of biometrics}, YEAR=1997 } @MISC{kn:dau97, AUTHOR={John Daugman}, TITLE={Iris Recognition for Personal Identification}, YEAR=1997 } @MISC{kn:gue97, AUTHOR={Eric Guerrino and Mike Kahn and Ellen Kapito}, TITLE={User Authentication and Encryption Overview}, YEAR=1997 } @ARTICLE{kn:ser91, AUTHOR={Omri Serlin}, TITLE={{SVR4} may become the first truly secure {U}nix}, JOURNAL={{\sc unixworld}}, MONTH={Noviembre}, PAGES={39--40}, VOLUME={VIII}, NUMBER={11}, YEAR=1991 } @INCOLLECTION{kn:gui92, AUTHOR={Louis Claude Guillou and Michel Ugon and Jean-Jacques Quisquater}, TITLE={The Smart Card -- A Standardized Security Device Dedicated to Public Cryptology}, BOOKTITLE={Contemporary Cryptology -- The Science of Information Integrity}, PAGES={561--614}, PUBLISHER={IEEE Press}, YEAR=1992 } @MISC{kn:rc570, AUTHOR={Roger Merckling and Anne Anderson}, TITLE={{RFC} 57.0: {S}mart {C}ard {I}ntroduction}, MONTH={Marzo}, YEAR=1994 } @BOOK{kn:rcg96, TITLE={Seguridad en Unix: Sistemas Abiertos e Internet}, AUTHOR={A. Ribagorda and A. Calvo and M.A. Gallardo}, PUBLISHER={Paraninfo}, YEAR=1996 } @INPROCEEDINGS{kn:tit98, AUTHOR={Dan Farmer and Brad Powell and Matthew Archibald}, TITLE={Titan}, BOOKTITLE={Proceedings of the 12th Systems Administration Conference -- LISA\'{}98}, PUBLISHER={The {\sc usenix} Association}, MONTH={Diciembre}, YEAR=1998 } @ARTICLE{kn:sha49, AUTHOR={C. E. Shannon}, TITLE={Communication theory of secrecy systems}, JOURNAL={Bell Systems Technology Journal}, VOLUME=28, PAGES={657--715}, YEAR=1949 } @ARTICLE{kn:dh76, AUTHOR={W. Diffie and M. E. Hellman}, TITLE={New Directions in Cryptography}, JOURNAL={IEEE Transactions on Information Theory}, VOLUME={IT-22}, MONTH={Noviembre}, PAGES={644--654}, YEAR=1976 } @BOOK{kn:cesid, AUTHOR={CESID}, TITLE={Glosario de t\'erminos de {C}riptolog\'{\i}a}, PUBLISHER={Centro Superior de Informaci\'on de la Defensa}, YEAR=1991 } @ARTICLE{kn:ree84, AUTHOR={James A. Reeds and Peter J. Weinberger}, TITLE={File Security and the {UNIX} System {\tt crypt} command}, JOURNAL={AT\&T Bell Labs Technical Journal}, VOLUME={63}, NUMBER={8}, PAGES={1673--1683}, MONTH={Octubre}, YEAR=1984, } @BOOK{kn:sch94, AUTHOR={Bruce Schneier}, TITLE={Applied Cryptography: Protocols, Algorithms and Source Code in C}, PUBLISHER={John Wiley \& Sons}, YEAR=1994 } @BOOK{kn:cab96, AUTHOR={Pino Caballero}, TITLE={Introducci\'on a la Criptograf\'{\i}a}, PUBLISHER={Ra-Ma}, YEAR=1996 } @BOOK{kn:den83, AUTHOR={Dorothy Denning}, TITLE={Cryptography and Data Security}, PUBLISHER={Addison-Wesley}, YEAR=1983 } @BOOK{kn:sal90, AUTHOR={A. Salomaa}, TITLE={Public Key Cryptography}, PUBLISHER={Springer-Verlag}, YEAR=1990 } @BOOK{kn:chr94, TITLE={The Unix Operating System}, AUTHOR={Kaare Christian and Susan Richter}, PUBLISHER={John Wiley \& Sons}, YEAR=1994 } @BOOK{kn:man91, TITLE={Unix: The complete book}, AUTHOR={Jason Manger}, YEAR={1991}, PUBLISHER={Sigma Press} } @BOOK{kn:tho82, TITLE={A User Guide to the {U}nix System}, AUTHOR={Rebecca Thomas and Jean Yates}, PUBLISHER={McGrawHill}, YEAR=1982 } @BOOK{kn:ker84, TITLE={The {U}nix Programming Environment}, AUTHOR={Brian W. Kernighan and Rob Pike}, PUBLISHER={Prentice Hall}, YEAR=1984 } @BOOK{kn:bac86, TITLE={The Design of the {U}nix Operating System}, AUTHOR={Maurice J. Bach}, PUBLISHER={Prentice Hall}, YEAR=1986 } @BOOK{kn:goo94, TITLE={The Magic Garden Explained: The Internals of {U}nix System {V} {R}elease 4, an Open Systems Design}, AUTHOR={Berny Goodheart and James Cox}, PUBLISHER={Prentice Hall}, YEAR=1994 } @BOOK{kn:bec96, TITLE={Linux Kernel Internals}, AUTHOR={Michael Beck and Harold Bohme and Mirko Dzladzka and Ulrich Kunitz and Robert Magnus and Dirk Verworner}, PUBLISHER={Addison-Wesley}, YEAR=1996 } @BOOK{kn:car97, TITLE={Programaci\'on Linux 2.0: API de sistema y funcionamiento del n\'ucleo}, AUTHOR={R\'emy Card and Eric Dumas and Frack M\'evel}, PUBLISHER={Eyrolles}, YEAR=1997 } @BOOK{kn:fri95, TITLE={Essential System Administration}, AUTHOR={{\AE}leen Frisch}, PUBLISHER={O\'{}Reilly \& Associates}, YEAR=1995 } @BOOK{kn:hun92, TITLE={TCP/IP Network Administration}, AUTHOR={Craig Hunt}, PUBLISHER={O\'{}Reilly \& Associates}, YEAR=1992 } @BOOK{kn:kir95, TITLE={The {L}inux {N}etwork {A}dministrators\'{} {G}uide}, AUTHOR={Olaf Kirch}, PUBLISHER={O\'{}Reilly \& Associates}, YEAR=1995 } @BOOK{kn:siy95, AUTHOR={Karanjit Siyan and Chris Hare}, TITLE={Internet y seguridad en redes}, PUBLISHER={Prentice Hall}, YEAR=1995 } @BOOK{kn:nem89, AUTHOR={Evi Nemeth and Garth Snyder and Scott Seebass}, TITLE={Unix {S}ystem {A}dministration {H}andbook}, PUBLISHER={Prentice Hall}, YEAR=1989 } @ARTICLE{kn:mil90, AUTHOR={Barton P. Miller and Lars Fredriksen and Bryan So}, TITLE={An empirical study of the reliability of {U}nix utilities}, JOURNAL={Communications of the ACM}, VOLUME={33}, NUMBER={12}, PAGES={32-44}, MONTH={Diciembre}, YEAR=1990 } @UNPUBLISHED{kn:mil95, AUTHOR={Barton P. Miller and David Koski and Cjin Pheow Lee and Vivekananda Maganty and Ravi Murthy and Ajitkumar Natarajan and Jeff Steidl}, TITLE={Fuzz Revisited: A Re-examination of the reliability of {U}nix utilities and services}, NOTE={ftp://grilled.cs.wisc.edu/technical$\_$papers/fuzz-revisited.ps}, YEAR=1995 } @ARTICLE{kn:tho84, TITLE={Refections on Trusting Trust}, AUTHOR={Ken Thompson}, JOURNAL={Communications of the ACM}, VOLUME=27, NUMBER=8, MONTH={Agosto}, YEAR=1984 } @ARTICLE{kn:lam73, TITLE={A Note on the {C}onfinement {P}roblem}, AUTHOR={B. W. Lampson}, JOURNAL={Communications of the ACM}, VOLUME=16, NUMBER=10, MONTH={Octubre}, PAGES={613--615}, YEAR=1973 } @BOOK{kn:ste90, TITLE={Unix {N}etwork {P}rogramming}, AUTHOR={W. Richard Stevens}, PUBLISHER={Prentice Hall}, YEAR=1990 } @INPROCEEDINGS{kn:jan97, TITLE={Scalability and Flexibility in Authentication Services: The {K}rypto{K}night {A}pproach}, AUTHOR={Philippe Janson and Gene Tsudik and Moti Yung}, BOOKTITLE={Proceedings of {INFOCOM}\'{}97}, PUBLISHER={{\sc ieee} Computer Society}, YEAR=1997 } @INPROCEEDINGS{kn:mol92, TITLE={Krypto{K}night {A}uthentication and {K}ey {D}istribution {S}ervice}, AUTHOR={Refik Molva and Gene Tsudik and Els Van Herrenweghen and Stefano Zatti}, BOOKTITLE={Proceedings of {ESORICS} 92}, MONTH={Octubre}, YEAR=1992 } @MISC{kn:pin93, TITLE={{SESAME}: {A}n {I}ntroduction}, AUTHOR={Pinkas and Parker and Kaijser}, YEAR=1993 } @PHDTHESIS{kn:atk93, TITLE={Charon: Kerberos Extensions for Authentication over Secondary Networks}, AUTHOR={Derek A. Atkins}, SCHOOL={{D}epartment of {E}lectrical {E}ngineering and {C}omputer {S}cience, {M}assachusetts {I}nstitute of {T}echnology}, YEAR=1993 } @ARTICLE{kn:nee78, TITLE={Using Encryption for Authentication in Large Networks of Computers}, AUTHOR={R.M. Needham and M.D. Schroeder}, JOURNAL={Communications of the {ACM}}, VOLUME=21, NUMBER=12, MONTH={Diciembre}, PAGES={993--999}, YEAR=1978 } @MISC{kn:firefaq, TITLE={Firewalls {F}requently {A}sked {Q}uestions}, AUTHOR={Marcus J. Ranum}, YEAR=1995 } @INCOLLECTION{kn:open, BOOKTITLE={Security in {O}pen {S}ystems}, AUTHOR={John Barkley and Lisa Carnahan and Karen Olsen and John Wack}, TITLE={Improving Security in a Network Environment}, PUBLISHER={National Institute of Standards and Technology ({\sc nist})}, EDITOR={John Barkley}, CHAPTER=10, MONTH={Julio}, NOTE={Special Publication 800-7}, YEAR=1994 } @UNPUBLISHED{kn:ciu99, TITLE={{HP-UX} Kernel Tuning and Performance Guide}, AUTHOR={Stephen Ciullo and Daniel Hinojosa}, NOTE={http://www.hp.com/techpartners/tuning.html}, INSTITUTION={Hewlett-Packard Company}, YEAR=1999 } @UNPUBLISHED{kn:wre98, TITLE={Linux {S}ecurity {A}dministrator\'{}s {G}uide}, AUTHOR={Dave Wreski}, NOTE={http://nic.com/\~{}dave/Security/}, YEAR=1998 } @TECHREPORT{kn:nist186, AUTHOR={National Institute of Standards and Technology}, TITLE={Digital {S}ignature {S}tandard}, YEAR=1984, INSTITUTION={U.S. Department of Commerce}, MONTH={Mayo}, NUMBER={NIST FIPS PUB 185} } @ARTICLE{kn:phrack54, TITLE={Linux and Random Source Bleaching}, AUTHOR={Phunda Menta}, JOURNAL={Phrack Magazine}, NUMBER=54, VOLUME=8, YEAR=1998 } @INPROCEEDINGS{kn:gut96, TITLE={Secure Deletion of Data from Magnetic and Solid-State Memory}, AUTHOR={Peter Gutmann}, BOOKTITLE={Sixth USENIX Security Symposium Proceedings}, PUBLISHER={The {\sc usenix} Association}, MONTH={Julio}, YEAR=1996 } @TECHREPORT{kn:ncsc91, AUTHOR={National Computer Security Center}, TITLE={Data {R}emanence in {A}utomated {I}nformation {S}ystems}, INSTITUTION={National Computer Security Center}, YEAR={1991}, MONTH={Septiembre}, NUMBER={NCSC-TG-025} } @TECHREPORT{kn:nsa85, AUTHOR={National Security Agency}, TITLE={Magnetic {T}ape {D}egausser}, INSTITUTION={National Security Agency/Central Security Service}, YEAR={1985}, MONTH={Octubre}, NUMBER={L14-4-A} } @UNPUBLISHED{kn:sei99, TITLE={Linux {A}dministrator\'{}s {S}ecurity {G}uide}, AUTHOR={Kurt Seifried}, NOTE={http://www.securityportal.com/lasg/}, YEAR=1999 } @UNPUBLISHED{kn:plas99, TITLE={Attacking {S}olaris with loadable kernel modules}, AUTHOR={Plasmoid}, NOTE={http://www.infowar.co.uk/thc/}, YEAR=1999 } @UNPUBLISHED{kn:pra99a, TITLE={Attacking {F}ree{BSD} with {K}ernel {M}odules}, AUTHOR={Pragmatic}, NOTE={http://www.infowar.co.uk/thc/}, MONTH={Junio}, YEAR=1999 } @UNPUBLISHED{kn:pra99b, TITLE={Complete {L}inux {L}oadable {K}ernel {M}odules}, AUTHOR={Pragmatic}, NOTE={http://www.infowar.co.uk/thc/}, MONTH={Marzo}, YEAR=1999 } @ARTICLE{kn:ale97, AUTHOR={Aleph One}, TITLE={Smashing The Stack For Fun And Profit}, JOURNAL={Phrack Magazine}, VOLUME=7, NUMBER=49, MONTH={Noviembre}, YEAR=1996 } @INCOLLECTION{kn:steg99, AUTHOR={Andrew D. McDonald and Markus G. Kuhn}, TITLE={Steg{FS}: {A} {S}teganographic {F}ile {S}ystem for {L}inux}, BOOKTITLE={Information Hiding}, PUBLISHER={Springer-Verlag}, PAGES={461--475}, EDITOR={Andreas Pfitzmann}, YEAR=1999 } @ARTICLE{kn:ans98, AUTHOR={R. J. Anderson and R. M. Needham and A. Shamir}, TITLE={The {S}teganographic {F}ile {S}ystem}, JOURNAL={Lecture Notes in Computer Science}, VOLUME={1525}, PAGES={73--82}, YEAR=1998 } @INPROCEEDINGS{kn:cfs93, AUTHOR={Matt Blaze}, TITLE={A {C}ryptographic {F}ile {S}ystem for {U}nix}, BOOKTITLE={Proceedings of the 1st {ACM} {C}onference on Computer and Communications Security}, YEAR=1993, ORGANIZATION={ACM}, PAGES={9--16}, MONTH={Noviembre} } @TECHREPORT{kn:ss98, AUTHOR={Carl van Schaik and Paul Smeddle}, TITLE={A {S}teganographic {F}ile {S}ystem {I}mplementation for {L}inux}, MONTH={Octubre}, INSTITUTION={University of Cape Town (South Africa)}, YEAR=1998 } @TECHREPORT{kn:sgi94, AUTHOR={Jeffrey B. Zurschmeide}, TITLE={{IRIX} {A}dvanced {S}ite and {S}erver {A}dministration {G}uide}, INSTITUTION={Silicon Graphics, Inc.}, NUMBER={007-0603-100}, YEAR=1994 } @TECHREPORT{kn:sgi99, AUTHOR={Karen Johnson and Jeffrey B. Zurschmeide and John Raithel and Bill Tuthill}, TITLE={{IRIX} Admin: backup, security and accounting}, INSTITUTION={Silicon Graphics, Inc.}, NUMBER={007-2862-004}, YEAR=1999 } @MISC{kn:dik99, AUTHOR={Casper Dik}, TITLE={{S}olaris 2 {FAQ}}, NOTE={ftp://ftp.wins.uva.nl/pub/solaris/}, VERSION={1.69}, MONTH={Octubre}, YEAR=1999 } @BOOK{kn:bre95, AUTHOR={D. Brent Chapman and Elizabeth D. Zwicky}, TITLE={Building {I}nternet {F}irewalls}, PUBLISHER={O\'{}Reilly \& Associates}, EDITION={1st}, MONTH={Noviembre}, YEAR=1995 } @TECHREPORT{kn:rob94, AUTHOR={Andrew T. Robinson}, TITLE={Internet {F}irewalls: {A}n {I}ntroduction}, INSTITUTION={NetMAINE}, ADDRESS={P.O. BOX 8258, Portland, ME 04104-8258, USA}, YEAR=1994 } @INPROCEEDINGS{kn:ran93, AUTHOR={Marcus J. Ranum}, TITLE={Thinking about {F}irewalls}, BOOKTITLE={Proceedings of the Second {SANS} {C}onference}, MONTH={Abril}, YEAR=1993 } @TECHREPORT{kn:sem96, AUTHOR={Chuck Semeria}, TITLE={Internet {F}irewalls and {S}ecurity}, INSTITUTION={3Com}, YEAR=1996 } @TECHREPORT{kn:wack94, TITLE={Keeping your site comfortably secure: an introduction to {I}nternet {F}irewalls}, AUTHOR={John P. Wack and Lisa J. Carnahan}, INSTITUTION={National Institute of Standards and Technology ({\sc nist})}, MONTH={Diciembre}, NOTE={Special Publication 800-10}, YEAR=1994 } @UNPUBLISHED{kn:rus00, TITLE={Linux {\tt ipchains} {HOWTO}, v. 1.0.8}, AUTHOR={Rusty Russell}, NOTE={http://www.linuxdoc.org/HOWTO/IPCHAINS-HOWTO.html}, MONTH={Julio}, YEAR=2000 } @TECHREPORT{kn:mou00, TITLE={Get acquainted with {L}inux {S}ecurity and {O}ptimization {S}ystem}, AUTHOR={Gerhard Mourani}, INSTITUTION={Open {N}etwork {A}rchitecture}, MONTH={Enero}, YEAR=2000 } @BOOK{kn:san90, TITLE={{VAX} {S}ecurity: {P}rotecting the {S}ystem and the {D}ata}, AUTHOR={Corey Sandler and Tom Badgett and Larry Lefkowitz}, PUBLISHER={John Wiley and Sons}, YEAR=1990 } @INCOLLECTION{kn:cow92, AUTHOR={Randle Cowcher}, TITLE={Physical {S}ecurity}, BOOKTITLE={Computer Security Reference Book}, PUBLISHER={Butterworth-Heinemann}, CHAPTER={24}, PAGES={311--332}, EDITOR={Keith M. Jackson and Jan Hruska}, YEAR=1992 } @INCOLLECTION{kn:syk70, AUTHOR={Gresham Sykes and David Matza}, TITLE={Techniques of {N}eutralization: {A} {T}heory of {D}elinquency}, BOOKTITLE={The Sociology of Crime and Delinquency}, EDITION={2nd}, PUBLISHER={John Wiley and Sons}, PAGES={292--299}, EDITOR={Marvin E. Wolfgang and others}, YEAR=1970 } @BOOK{kn:cor86, AUTHOR={D.B. Cornish and R. V. Clarke}, TITLE={The Reasoning Criminal: Rational Choice Perspectives on Offending}, PUBLISHER={Springer-Verlag}, YEAR=1986 } @BOOK{kn:hol83, AUTHOR={Richard C. Hollinger and John P. Clark}, TITLE={Theft by Employees}, PUBLISHER={Lexington Books}, YEAR=1983 } @BOOK{kn:kat88, AUTHOR={J. Katz}, TITLE={Seductions of Crime: Moral and Sensual Attractions in Doing Evil}, PUBLISHER={Basic Books}, YEAR=1988 } @ARTICLE{kn:rei89, AUTHOR={N. Reichman}, TITLE={Breaking Confidences: Organizational Influences on Insider Trading}, JOURNAL={The Sociological Quarterly}, VOLUME={30}, PAGES={185--204}, YEAR=1989 } @INCOLLECTION{kn:smi92, AUTHOR={Martin Smith}, TITLE={Personnel {S}ecurity}, BOOKTITLE={Computer Security Reference Book}, PUBLISHER={Butterworth-Heinemann}, CHAPTER={33}, PAGES={417--436}, EDITOR={Keith M. Jackson and Jan Hruska}, YEAR=1992 } @ARTICLE{kn:koh95, AUTHOR={R. Kohno and R. Meidan and L.B. Milstein}, TITLE={Spread {S}pectrum {A}ccess {M}ethods for {W}ireless {C}ommunications}, JOURNAL={{IEEE} Communications Magazine}, VOLUME=33, PAGES={58--67}, MONTH={Enero}, YEAR=1995 } @ARTICLE{kn:and94, AUTHOR={Ross J. Anderson}, TITLE={Why {C}ryptosystems {F}ail}, JOURNAL={Communications of the {ACM}}, VOLUME=37, PAGES={32--40}, MONTH={Noviembre}, YEAR=1994 } @ARTICLE{kn:hig88, AUTHOR={H.J. Highland}, TITLE={Electromagnetic {E}avesdropping {M}achines for {C}hristmas?}, JOURNAL={Computers and {S}ecurity}, VOLUME=7, NUMBER=4, YEAR=1988 } @ARTICLE{kn:eck85, AUTHOR={Wim van Eck}, TITLE={Electromagnetic {R}adiation from {V}ideo {D}isplay {U}nits: An {E}avesdropping {R}isk?}, JOURNAL={Computers and {S}ecurity}, VOLUME=4, NUMBER=4, YEAR=1985 } @ARTICLE{kn:smu90, AUTHOR={Peter Smulders}, TITLE={The {T}hreat of {I}nformation {T}heft by {R}eception of {E}lectromagnetic {R}adiation from {RS-232} {C}ables}, JOURNAL={Computers and {S}ecurity}, VOLUME=9, NUMBER=1, YEAR=1990 } @INCOLLECTION{kn:swi92, AUTHOR={Peter Swinbank}, TITLE={Electromagnetic {R}adiation}, BOOKTITLE={Computer Security Reference Book}, PUBLISHER={Butterworth-Heinemann}, CHAPTER={11}, PAGES={75--90}, EDITOR={Keith M. Jackson and Jan Hruska}, YEAR=1992 } @INCOLLECTION{kn:mil87, AUTHOR={S.P. Miller and B.C. Neuman and J.I. Schiller and J.H. Saltzer}, TITLE={Kerberos {A}uthentication and {A}uthorization {S}ystem}, BOOKTITLE={Project {A}thena {T}echnical {P}lan}, CHAPTER={E.2.1}, PUBLISHER={Massachusetts Institute of Technology}, MONTH={Diciembre}, YEAR=1987 } @INCOLLECTION{kn:bel91, AUTHOR={Steven M. Bellovin and Michael Merritt}, TITLE={Limitations of the {K}erberos {A}uthentication {S}ystem}, PAGES={253--267}, BOOKTITLE={Proceedings of the {W}inter 1991 {\sc usenix} {C}onference}, PUBLISHER={The {\sc usenix} Association}, MONTH={Enero}, YEAR=1991 } @TECHREPORT{kn:apo88, TITLE={Managing {S}ys{V} {S}ystem {S}oftware}, AUTHOR={Apollo Computer}, INSTITUTION={Apollo Computer, Inc. (Hewlett Packard)}, NUMBER={010851-A00}, MONTH={Junio}, YEAR=1988 } @MISC{kn:smi97, TITLE={Stack {S}mashing {V}ulnerabilities in the {U}nix {O}perating {S}ystem}, AUTHOR={Nathan P. Smith}, NOTE={http://millcomm.com/\~{}nate/machines/security/stack-smashing/}, YEAR=1997 } @ARTICLE{kn:ins97, AUTHOR={Shawn Instentes}, TITLE={Stack {S}mashing: {W}hat to do?}, JOURNAL={;login:}, VOLUME=22, NUMBER=2, MONTH={Abril}, PUBLISHER={The {\sc usenix} Association}, YEAR=1997 } @ARTICLE{kn:gal96b, AUTHOR={Peter Galvin}, TITLE={Controlling {ACL}s}, JOURNAL={Sun{W}orld}, MONTH={Agosto}, YEAR=1996 } @TECHREPORT{kn:fips81, AUTHOR={National Bureau of Standars}, TITLE={{DES} {M}odes of {O}peration}, INSTITUTION={U.S. Department of Commerce}, MONTH={Dicembre}, NUMBER={NBS FIPS PUB 81}, YEAR=1980 } @TECHREPORT{kn:iso88, AUTHOR={International Standards Organization}, TITLE={Information {P}rocessing {S}ystems - {OSI RM}}, NOTE={Part 2: Security Architecture}, INSTITUTION={ISO/TC}, NUMBER={97 7498-2}, YEAR=1988 } @BOOK{kn:muf93, AUTHOR={Sead Muftic and Ahmed Patel and Peter Sanders and Rafael Colon and Jan Heijnsdijk and Unto Pulkkinen}, TITLE={Security in {O}pen {S}ystems}, PUBLISHER={John Wiley and Sons}, YEAR=1993 } @MANUAL{kn:rfc1244, AUTHOR={Dave Curry and others}, TITLE={{RFC1244}: {S}ite {S}ecurity {H}andbook}, MONTH={Julio}, ORGANIZATION={Internet Activities Board}, YEAR=1991 } @INPROCEEDINGS{kn:par94, AUTHOR={Donn B. Parker}, TITLE={Demonstrating the elements of information security with threats}, BOOKTITLE={Proceedings of the 17th National Computer Security Conference}, PAGES={421--430}, YEAR=1994 } @INPROCEEDINGS{kn:sch98, AUTHOR={Bruce Schneier and John Kelsey}, TITLE={Cryptographic support for secure logs on untrusted machines}, BOOKTITLE={Proceedings of the 7th {\sc usenix} Security Symposium}, PUBLISHER={The {\sc usenix} Association}, MONTH={Enero}, YEAR=1998 } @INPROCEEDINGS{kn:axe98, AUTHOR={Stefan Axelsson and Ulf Lindqvist and Ulf Gustafson and Erland Jonsson}, TITLE={An approach to {U}nix {S}ecurity {L}ogging}, BOOKTITLE={Proceedings of the 21st National Information Systems Security Conference}, PAGES={62--75}, MONTH={Octubre}, PUBLISHER={National Institute of Standards and Technology/National Computer Security Center}, YEAR=1998 } @INPROCEEDINGS{kn:ven92, AUTHOR={Wietse Venema}, TITLE={{TCP} {W}rapper: Network monitoring, access control and booby traps}, BOOKTITLE={Proceedings of the 3rd {\sc usenix} {U}nix {S}ecurity {S}ymposium}, PAGES={85--92}, PUBLISHER={The {\sc usenix} Association}, MONTH={Septiembre}, YEAR=1992 } @BOOK{kn:san82, AUTHOR={Valentin Sanz Caja}, TITLE={Vulnerabilidad y seguridad de los sistemas inform\'aticos}, PUBLISHER={Fundaci\'on Citema}, YEAR=1982 } @BOOK{kn:pla83, AUTHOR={Jos\'e Plans}, TITLE={La pratique de l\'{}audit informatique}, PUBLISHER={Eyrolles}, YEAR=1983 } @INPROCEEDINGS{kn:meh98, AUTHOR={Nimisha V. Mehta and Karen R. Sollins}, TITLE={Expanding and extending the security features of {J}ava}, BOOKTITLE={Proceedings of the 7th {\sc usenix} Security Symposium}, PUBLISHER={The {\sc usenix} Association}, MONTH={Enero}, YEAR=1998 } @ARTICLE{kn:gal96a, AUTHOR={Miguel \'Angel Gallardo}, TITLE={Seguridad (e inseguridad) en {J}ava}, JOURNAL={Seguridad en Inform\'atica y Comunicaciones}, NUMBER=20, MONTH={Junio}, YEAR=1996 } @MISC{kn:pol93, AUTHOR={W. Timothy Polk and Lawrence E. Bassham}, TITLE={Security issues in the {D}atabase {L}anguage {SQL}}, MONTH={Julio}, YEAR=1993 } @ARTICLE{kn:bis86, AUTHOR={Matt Bishop}, TITLE={How to write a setuid program}, JOURNAL={;login:}, MONTH={Enero}, NUMBER=1, VOLUME=12, YEAR=1986 } @INPROCEEDINGS{kn:dea96, AUTHOR={Drew Dean and Edward W. Felten and Dan S. Wallach}, TITLE={Java {S}ecurity: from {H}ot{J}ava to {N}etscape and beyond}, BOOKTITLE={Proceedings of the {IEEE} {S}ymposium on {S}ecurity and {P}rivacy}, YEAR=1996 } @INPROCEEDINGS{kn:sim90, AUTHOR={Steve Simmons}, TITLE={Life without root}, BOOKTITLE={Proceedings of the 4th Systems Administration Conference -- LISA\'{}90}, PUBLISHER={The {\sc usenix} Association}, MONTH={Octubre}, YEAR=1990 } @UNPUBLISHED{kn:and97, AUTHOR={Ross J. Anderson}, TITLE={Tamperproofing of {C}hip {C}ards}, NOTE={Enviado a la lista {\tt cypherpunks@cyberpass.net} por William H. Geiger III en septiembre}, YEAR=1997 } @ARTICLE{kn:pit99, AUTHOR={Jes\'us Pita}, TITLE={La tarjeta inteligente como medio de identificaci\'on electr\'onica y acceso a servicios de seguridad: la experiencia de la {\sc fnmt-rcm}}, JOURNAL={Seguridad en Inform\'atica y Comunicaciones}, NUMBER=39, MONTH={Abril}, YEAR=2000 } @INPROCEEDINGS{kn:bal99, AUTHOR={Dirk Balfanz and Edward W. Felten}, TITLE={Hand-Held computers can be better smart cards}, BOOKTITLE={Proceedings of the 8th {\sc usenix} Security Symposium}, PUBLISHER={The {\sc usenix} Association}, MONTH={Agosto}, YEAR=1999 } @INPROCEEDINGS{kn:gob96, AUTHOR={H. Gobioff and S. Smith and J.D. Tygar and B. Yee}, TITLE={Smart cards in hostile environments}, BOOKTITLE={Proceedings of the 2nd {\sc usenix} Workshop on Electronic Commerce}, PUBLISHER={The {\sc usenix} Association}, MONTH={Noviembre}, YEAR=1996 } @INPROCEEDINGS{kn:and96, AUTHOR={Ross J. Anderson and Markus Kuhn}, TITLE={Tamper Resistance -- a Cautionary Note}, BOOKTITLE={Proceedings of the 2nd {\sc usenix} Workshop on Electronic Commerce}, PUBLISHER={The {\sc usenix} Association}, MONTH={Noviembre}, PAGES={1--11}, YEAR=1996 } @INCOLLECTION{kn:dau98, AUTHOR={John Daugman}, TITLE={Recognizing persons by their iris patterns}, BOOKTITLE={Biometrics: {P}ersonal {I}dentification in {N}etworked {S}ociety}, PUBLISHER={Kluwer}, PAGES={103--121}, YEAR=1998 } @INPROCEEDINGS{kn:huo98, AUTHOR={Simo Huopio}, TITLE={Biometric {I}dentification}, BOOKTITLE={Seminar on Network Security: Authorization and Access Control in Open Network Environment}, INSTITUTION={Helsinki University of Technology}, YEAR=1998 } @ARTICLE{kn:phi97, AUTHOR={Ken Phillips}, TITLE={Biometric identification comparison chart}, JOURNAL={{PC} {W}eek}, MONTH={Marzo}, YEAR=1997 } @TECHREPORT{kn:bou96, AUTHOR={F. Bouchier and J.S. Ahrens and G. Wells}, TITLE={Laboratory evaluation of the {I}ri{S}can prototype biometric identifier}, INSTITUTION={Sandia National Laboratories}, NUMBER={SAND96-1033}, MONTH={Abril}, YEAR=1996 } @TECHREPORT{kn:mcm97, AUTHOR={Dave McMordie}, TITLE={Texture Analysis of The Human Iris for High Security Authentication}, INSTITUTION={Department of Electrical Engineering, McGill University}, NUMBER={Image Processing 304-529}, MONTH={Diciembre}, YEAR=1997 } @ARTICLE{kn:dif77, AUTHOR={W. Diffie and M.E. Hellman}, TITLE={Exhaustive cryptanalysis of the {\sc nbs} data encryption standad}, JOURNAL={Computer}, NUMBER=6, VOLUME=10, PAGES={74--84}, MONTH={Junio}, YEAR=1977 } @INPROCEEDINGS{kn:ked99, AUTHOR={Gershon Kedem and Yuriko Ishihara}, TITLE={Brute force attack on {U}nix passwords with {\sc simd} computer}, BOOKTITLE={Proceedings of the 8th {\sc usenix} Security Symposium}, PUBLISHER={The {\sc usenix} Association}, MONTH={Agosto}, YEAR=1999 } @ARTICLE{kn:man96, AUTHOR={U. Manber}, TITLE={A simple scheme to make passwords based on {O}ne-{W}ay functions much harder to crack}, JOURNAL={Computers \& Security}, NUMBER=2, VOLUME=15, PAGES={171--176}, YEAR=1996 } @ARTICLE{kn:lam81, AUTHOR={Leslie Lamport}, TITLE={Password authentication with insecure communication}, JOURNAL={Communications of the ACM}, VOLUME=24, NUMBER=11, MONTH={Noviembre}, PAGES={770-772}, YEAR=1981 } @INPROCEEDINGS{kn:hal94, AUTHOR={Neil Haller}, TITLE={The {\sc s/key} one time password system}, BOOKTITLE={Proceedings of the {\sc isoc} Symposium on network and distributed systems security}, MONTH={Febrero}, YEAR=1994 } @INPROCEEDINGS{kn:riv90, AUTHOR={Ron Rivest}, TITLE={The {\sc md4} Message Digest Algorithm}, BOOKTITLE={Crypto\'{}90 Abstracts}, MONTH={Agosto}, PAGES={281--291}, YEAR=1990 } @MISC{kn:riv92, AUTHOR={Ron Rivest}, TITLE={The {\sc md5} Message Digest Algorithm}, NOTE={Internet Request for Comments 1321}, MONTH={Abril}, YEAR=1992 } @INPROCEEDINGS{kn:duf89, AUTHOR={Tom Duff}, TITLE={Experience with Viruses on {UNIX} Systems}, VOLUME=2, ISSUE=2, BOOKTITLE={{\sc usenix} Computing Systems}, YEAR=1989 } @INPROCEEDINGS{kn:mci89, AUTHOR={M. Douglas McIlroy}, TITLE={Virology 101}, VOLUME=2, ISSUE=2, BOOKTITLE={{\sc usenix} Computing Systems}, YEAR=1989 } @TECHREPORT{kn:bis95b, AUTHOR={Matt Bishop}, TITLE={Race conditions, files and security flaws; or the Tortoise and the Hare {\it Redux}}, NUMBER={CSE-95-8}, INSTITUTION={University of California at Davis}, YEAR=1995 } @ARTICLE{kn:bis96, AUTHOR={Matt Bishop and Michael Dilger}, TITLE={Checking for race conditions in file accesses}, JOURNAL={Computing System}, NUMBER=2, VOLUME=9, PAGES={131--152}, MONTH={Primavera}, YEAR=1996 } @TECHREPORT{kn:rad93, AUTHOR={Peter V. Radatti}, TITLE={The Plausibility of {UNIX} Virus Attacks}, INSTITUTION={Cybersoft, Inc.}, YEAR=1993 } @TECHREPORT{kn:rad95, AUTHOR={Peter V. Radatti}, TITLE={Computer Viruses in {U}nix Networks}, INSTITUTION={Cybersoft, Inc.}, YEAR=1995 } @ARTICLE{kn:rad92, AUTHOR={Peter V. Radatti}, TITLE={Computer Virus Awareness for {UNIX}}, JOURNAL={NCSA News}, MONTH={Mayo}, VOLUME=3, ISSUE=3, PAGES=8, YEAR=1992 } @INPROCEEDINGS{kn:coh94, AUTHOR={Fred Cohen}, TITLE={Computer viruses: theory and experiments}, BOOKTITLE={7th {DoD}/{NBS} Computer Security Conference Proceedings}, MONTH={Septiembre}, PAGES={240--263}, YEAR=1984 } @ARTICLE{kn:sho82, AUTHOR={John F. Shoch and Jon A. Hupp}, TITLE={The Worm Programs -- Early experience with a Distributed Computation}, JOURNAL={Communications of the {ACM}}, VOLUME=25, NUMBER=3, PAGES={172--180}, MONTH={Marzo}, YEAR=1982 } @ARTICLE{kn:mar88a, AUTHOR={John Markhoff}, TITLE={Author of computer `virus' is son of {U}.{S}. Electronic Security Expert}, JOURNAL={The New York Times}, MONTH={5 Noviembre}, YEAR=1988 } @ARTICLE{kn:mar88b, AUTHOR={John Markhoff}, TITLE={A family\'{}s passion for computers, gone sour}, JOURNAL={The New York Times}, MONTH={11 Noviembre}, YEAR=1988 } @ARTICLE{kn:roy88, AUTHOR={Mike Royko}, TITLE={Here\'{}s how to stop computer vandals}, JOURNAL={The Chicago Tribune}, MONTH={7 Noviembre}, YEAR=1988 } @BOOK{kn:kra, AUTHOR={Micki Krause and Harold F. Tipton}, TITLE={Handbook of Information Security Management}, PUBLISHER={CRC Press LLC}, YEAR=1997 } @TECHREPORT{kn:cert99, TITLE={{CERT} {A}dvisory {CA}--99--02. {T}rojan {H}orses}, AUTHOR={CERT}, INSTITUTION={Computer Emergency Response Team}, MONTH={Marzo}, YEAR=1999 } @BOOK{kn:mcg96, AUTHOR={Gary McGraw and Edward Felten}, TITLE={Java Security: Hostile Applets, Holes and Antidotes}, PUBLISHER={John Wiley and Sons}, YEAR=1996 } @TECHREPORT{kn:gli93, AUTHOR={Virgil D. Gligor and others}, TITLE={A {G}uide to understanding {C}overt {C}hannel {A}nalysis of {T}rusted {S}ystems}, INSTITUTION={National Computer Security Center}, YEAR=1993, MONTH={Noviembre}, NUMBER={NCSC-TG-030} } @ARTICLE{kn:lip75, AUTHOR={Steven B. Lipner}, TITLE={A note on the {C}onfinement {P}roblem}, JOURNAL={Operating Systems Review}, NUMBER=5, VOLUME=9, MONTH={Noviembre}, PAGES={192--196}, YEAR=1975 } @ARTICLE{kn:dae96, AUTHOR={Route}, TITLE={Project {L}oki: {\sc icmp} {T}unnelling}, JOURNAL={Phrack Magazine}, VOLUME=7, NUMBER=49, MONTH={Noviembre}, YEAR=1996 } @MISC{kn:row96, AUTHOR={Craig H. Rowland}, TITLE={Covert {C}hannels in the {\sc tcp/ip} {P}rotocol {S}uite}, YEAR=1996 } @INPROCEEDINGS{kn:wra91a, AUTHOR={J.W. Wray}, TITLE={Toward a mathematical foundation for information flow security}, BOOKTITLE={Proceedings of the 1991 Symposium on Research in Security and Privacy}, PAGES={21--34}, PUBLISHER={{\sc ieee} Computer Society}, MONTH={Mayo}, YEAR=1991 } @INPROCEEDINGS{kn:hu91, AUTHOR={W. M. Hu}, TITLE={Reducing timing channels with fuzzy time}, BOOKTITLE={Proceedings of the 1991 Symposium on Research in Security and Privacy}, PAGES={8--20}, PUBLISHER={{\sc ieee} Computer Society}, MONTH={Mayo}, YEAR=1991 } @INPROCEEDINGS{kn:wra91b, AUTHOR={J.C. Wray}, TITLE={An analysis of covert timing channels}, BOOKTITLE={Proceedings of the 1991 Symposium on Research in Security and Privacy}, PAGES={2--7}, PUBLISHER={{\sc ieee} Computer Society}, MONTH={Mayo}, YEAR=1991 } @INPROCEEDINGS{kn:por91, AUTHOR={P.A. Porras and R.A. Kemmerer}, TITLE={Analyzing covert storage channels}, BOOKTITLE={Proceedings of the 1991 Symposium on Research in Security and Privacy}, PAGES={36--51}, PUBLISHER={{\sc ieee} Computer Society}, MONTH={Mayo}, YEAR=1991 } @INPROCEEDINGS{kn:pro92, AUTHOR={Norman E. Proctor and Peter G. Neumann}, TITLE={Architectural implications of {C}overt {C}hannels}, BOOKTITLE={Proceedings of the 15th National Computer Security Conference}, PAGES={28--43}, MONTH={Octubre}, YEAR=1992 } @INCOLLECTION{kn:mch95, AUTHOR={John McHugh}, TITLE={Covert Channel Analysis}, BOOKTITLE={Handbook for the Computer Security Certification of Trusted Systems}, PUBLISHER={Naval Research Laboratory}, MONTH={Enero}, YEAR=1995 } @INPROCEEDINGS{kn:mos94, AUTHOR={Ira S. Moskowitz and Myong H. Kang}, TITLE={{C}overt {C}hannels -- {H}ere to {S}tay?}, BOOKTITLE={Proceedings of COMPASS\'{}94}, PAGES={235--243}, PUBLISHER={{\sc ieee} Press}, MONTH={Junio}, YEAR=1994 } @MISC{kn:vic94, AUTHOR={Bob Vickers}, TITLE={Guide to safe {X}}, INSTITUTION={University of London Computer Centre}, MONTH={Febrero}, YEAR=1994 } @TECHREPORT{kn:fis95, AUTHOR={John Fisher}, TITLE={Securing {X} {W}indows}, INSTITUTION={Department of Energy Computer Incident Advisory Capability -- CIAC}, NUMBER={CIAC-2316 R.0}, MONTH={Agosto}, YEAR=1995 } @BOOK{kn:tan95, AUTHOR={Andrew Tanenbaum}, TITLE={Distributed Operating Systems}, PUBLISHER={Prentice Hall}, YEAR=1995 } @BOOK{kn:cou94, AUTHOR={G.F. Couloris and J. Dollimore and T. Kindberg}, TITLE={Distributed Systems. Concepts and design}, PUBLISHER={Addison Wesley}, EDITION={2nd}, YEAR=1994 } @BOOK{kn:ste94, TITLE={TCP/IP Illustrated Volume I: The Protocols}, AUTHOR={W. Richard Stevens}, PUBLISHER={Addison Wesley}, YEAR=1994 } @BOOK{kn:cos97a, TITLE={Sendmail}, AUTHOR={Bryan Costales and Eric Allman}, PUBLISHER={O\'{}Reilly \& Associates}, EDITION={2nd}, MONTH={Enero}, YEAR=1997 } @BOOK{kn:cos97b, TITLE={Sendmail Desktop Reference}, AUTHOR={Bryan Costales and Eric Allman}, PUBLISHER={O\'{}Reilly \& Associates}, MONTH={Marzo}, YEAR=1997 } @BOOK{kn:ano97, TITLE={Maximum Security: a hacker\'{}s guide to protecting your Internet site and network}, AUTHOR={Anonymous}, PUBLISHER={McMillan Computer Publishing}, YEAR=1997 } @BOOK{kn:gar97, AUTHOR={Simson Garfinkel and Eugene H. Spafford}, TITLE={Web Security \& Commerce}, PUBLISHER={O'Reilly \& Associates}, EDITION={1st}, MONTH={Junio}, YEAR=1997 } @BOOK{kn:gun96, AUTHOR={Shishir Gundavaram}, TITLE={CGI Programming on the World Wide Web}, PUBLISHER={O'Reilly \& Associates}, EDITION={1st}, MONTH={Marzo}, YEAR=1996 } @BOOK{kn:gon99, AUTHOR={Marcus Goncalves and Steven Brown}, TITLE={Check Point Firewall--1 Administration Guide}, PUBLISHER={McGrawHill}, YEAR=1999 } @BOOK{kn:gon97, AUTHOR={Marcus Goncalves}, TITLE={Firewalls Complete}, PUBLISHER={McGrawHill}, YEAR=1997 } @BOOK{kn:rei88, AUTHOR={Tim O\'{}Reilly and Grace Todino}, TITLE={Managing {\sc uucp} and {U}se{N}et}, PUBLISHER={O'Reilly \& Associates}, MONTH={Marzo}, YEAR=1988 } @MISC{kn:bis90, AUTHOR={Matt Bishop}, TITLE={A {S}ecurity {A}nalysis of the {NTP} {P}rotocol}, YEAR=1990 } @TECHREPORT{kn:kim93, AUTHOR={Gene H. Kim and Eugene H. Spafford}, TITLE={The Design and Implementation of {T}ripwire: A File System Integrity Checker}, NUMBER={CSD-TR-93-071}, INSTITUTION={Purdue University}, MONTH={Noviembre}, YEAR=1993 } @INPROCEEDINGS{kn:kim94a, AUTHOR={Gene H. Kim and Eugene H. Spafford}, TITLE={Experiences with {T}ripwire: using integrity checkers for intrusion detection}, BOOKTITLE={Systems Administration, Networking and Security Conference {III}}, PUBLISHER={The {\sc usenix} Association}, MONTH={Abril}, YEAR=1994 } @INPROCEEDINGS{kn:kim94b, AUTHOR={Gene H. Kim and Eugene H. Spafford}, TITLE={Writing, supporting and evaluating {T}ripwire: a publically available security tool}, BOOKTITLE={Proceedings of the {\sc usenix} Applications Development Symposium}, PUBLISHER={The {\sc usenix} Association}, YEAR=1994 } @BOOK{kn:fre98, AUTHOR={Martin Freiss}, TITLE={Protecting networks with {SATAN}}, PUBLISHER={O'Reilly \& Associates}, EDITION={1st}, MONTH={Mayo}, YEAR=1998 } @INPROCEEDINGS{kn:ylo96, AUTHOR={Tatu Ylonen}, TITLE={{\sc ssh} -- {S}ecure login connetions over the {I}nternet}, BOOKTITLE={Proceedings of the 6th {\sc usenix} Security Symposium}, PUBLISHER={The {\sc usenix} Association}, PAGES={37--42}, MONTH={Julio}, YEAR=1996 } @INPROCEEDINGS{kn:win95, AUTHOR={Ira S. Winkler and Brian Dealy}, TITLE={Information Security Technology?...{D}on\'{}t rely on it. {A} Case Study in Social Engineering}, BOOKTITLE={Proceedings of the 5th {\sc usenix} Unix Security Symposium}, PUBLISHER={The {\sc usenix} Association}, MONTH={Junio}, YEAR=1995 } @ARTICLE{kn:fen99, AUTHOR={Carole Fennelly}, TITLE={The human side of Computer Security}, JOURNAL={SunWorld}, MONTH={Julio}, YEAR=1999 } @ARTICLE{kn:rad97, AUTHOR={Peter V. Radatti}, TITLE={Mr{M}ean the hacker}, JOURNAL={;login:}, MONTH={Octubre}, YEAR=1997 } @INPROCEEDINGS{kn:hec88, AUTHOR={Matthew S. Hecht and Abhai Johri and Radhakrishna Aditham and T. John Wei}, TITLE={Experience adding {C}2 {S}ecurity {F}eatures to {U}nix}, BOOKTITLE={{\sc usenix} Conference Proceedings}, PUBLISHER={The {\sc usenix} Association}, PAGES={133--146}, MONTH={Verano}, YEAR=1988 } @ARTICLE{kn:mel97, AUTHOR={Mark K. Mellis}, TITLE={Surprises in the {DMZ}}, JOURNAL={;login:}, VOLUME=22, NUMBER=1, MONTH={Febrero}, YEAR=1997 } @ARTICLE{kn:sch97, AUTHOR={John Schimmel}, TITLE={A Historical Look at Firewall Technologies}, JOURNAL={;login:}, VOLUME=22, NUMBER=1, MONTH={Febrero}, YEAR=1997 } @BOOK{kn:nrc99, AUTHOR={Committee on Information Systems Trustworthiness, National Research Council}, TITLE={Trust in Cyberspace}, EDITOR={Fred B. Schneider}, PUBLISHER={National Academy Press}, YEAR=1999 } @INPROCEEDINGS{kn:cha92, AUTHOR={D. Brent Chapman}, TITLE={Network ({I}n){S}ecurity through {\sc ip} Packet Filtering}, BOOKTITLE={Proceedings of the third {\sc usenix} Security Symposium}, PUBLISHER={The {\sc usenix} Association}, MONTH={Septiembre}, PAGES={63--76}, YEAR=1992 } @INPROCEEDINGS{kn:mog89, AUTHOR={Jeffrey C. Mogul}, TITLE={Simple and flexible datagram access control for {U}nix--based gateways}, BOOKTITLE={Proceedings of the {\sc usenix} Summer Conference}, PUBLISHER={The {\sc usenix} Association}, PAGES={203-221}, YEAR=1989 } @INPROCEEDINGS{kn:cor91, AUTHOR={Bruce Corbridge and Robert Henig and Charles Slater}, TITLE={Packet filtering in an {\sc ip} router}, BOOKTITLE={Proceedings of the Fifth LISA Conference}, PUBLISHER={The {\sc usenix} Association}, PAGES={227-232}, MONTH={Octubre}, YEAR=1991 } @BOOK{kn:par98, AUTHOR={William Parkhurst}, TITLE={Cisco Router OSPF Design and Implementation Guide}, PUBLISHER={McGrawHill}, YEAR=1998 } @ARTICLE{kn:bell93, AUTHOR={Steven M. Bellovin}, TITLE={Packets found on an Internet}, JOURNAL={Computer Communications Review}, NUMBER=3, VOLUME=23, PAGES={26--31}, MONTH={Julio}, YEAR=1993 } @INPROCEEDINGS{kn:bel92, AUTHOR={Steven M. Bellovin}, TITLE={There be dragons}, BOOKTITLE={Proceedings of the Third {\sc usenix} Security Symposium}, PUBLISHER={The {\sc usenix} Association}, PAGES={1--16}, MONTH={Septiembre}, YEAR=1992 } @INPROCEEDINGS{kn:ches92, AUTHOR={William R. Cheswick}, TITLE={An evening with {B}erferd, in which a cracker is lured, endured, and studied}, BOOKTITLE={Proceedings of the Winter {\sc usenix} Conference}, PUBLISHER={The {\sc usenix} Association}, MONTH={Enero}, YEAR=1992 } @BOOK{kn:che94, AUTHOR={William R. Cheswick and Steven M. Bellovin}, TITLE={Firewalls and Internet Security: Repelling the wily hacker}, PUBLISHER={Addison Wesley}, YEAR=1994 } @INPROCEEDINGS{kn:win93, AUTHOR={G. Winfield Treese and Alec Wolman}, TITLE={X through the firewall, and other applications relays}, BOOKTITLE={Proceedings of the {\sc usenix} Summer Conference}, PUBLISHER={The {\sc usenix} Association}, MONTH={Junio}, YEAR=1993 } @MISC{kn:ste98, AUTHOR={Ingo Stengel}, TITLE={Security Architectures based on active Firewall Components}, NOTE={FH--Darmstadt}, YEAR=1998 } @INPROCEEDINGS{kn:kob92, AUTHOR={David Koblas and Michelle Koblas}, TITLE={SOCKS}, BOOKTITLE={Proceedings of the Third Unix Security Symposium}, PUBLISHER={The {\sc usenix} Association}, MONTH={Septiembre}, PAGES={77--83}, YEAR=1992 } @INPROCEEDINGS{kn:ran93a, AUTHOR={Marcus J. Ranum and Frederick M. Avolio}, TITLE={A Toolkit and Methods for Internet Firewalls}, BOOKTITLE={Proceedings of the Technical Summer Conference}, PUBLISHER={The {\sc usenix} Association}, MONTH={Junio}, PAGES={37--44}, YEAR=1994 } @BOOK{kn:kah67, AUTHOR={David Kahn}, TITLE={The Codebreakers}, PUBLISHER={McMillan}, YEAR=1967 } @BOOK{kn:men96, AUTHOR={Alfred J. Menezes and Paul C. van Oorschot and Scott A. Vanstone}, TITLE={Handbook of Applied Cryptography}, PUBLISHER={CRC Press}, MONTH={Octubre}, YEAR=1996 } @TECHREPORT{kn:army, AUTHOR={Department of the US Army Headquarters}, TITLE={Basic Cryptanalysis}, INSTITUTION={United States Army}, YEAR=1990, MONTH={Septiembre}, NUMBER={FM-34-40-2} } @ARTICLE{kn:ben96, AUTHOR={W. Bender and D. Gruhl and N. Morimoto and A. Lu}, TITLE={Techniques for data hiding}, JOURNAL={{IBM} Systems Journal}, VOLUME=35, NUMBER={3,4}, YEAR=1996 } @INPROCEEDINGS{kn:schy94, AUTHOR={van Schyndel, R. G. and A. Z. Tirkel and C. F. Osborne}, TITLE={A Digital Watermark}, BOOKTITLE={International Conference on Image Processing}, VOLUME=2, ORGANIZATION={IEEE}, PAGES={86--90}, YEAR=1994 } @BOOK{kn:gar95, AUTHOR={Simson Garfinkel}, TITLE={{PGP}: {P}retty {G}ood {P}rivacy}, PUBLISHER={O'Reilly \& Associates}, MONTH={Enero}, YEAR=1995 } @TECHREPORT{kn:spa90, AUTHOR={Eugene H. Spafford}, TITLE={Are computer hacker break--ins ethical?}, NUMBER={CSD-TR-994}, INSTITUTION={Purdue University}, MONTH={Julio}, YEAR=1990 } @ARTICLE{kn:sto88, AUTHOR={Cliff Stoll}, TITLE={Stalking the wily hacker}, JOURNAL={Communications of the {ACM}}, VOLUME=31, NUMBER=5, PAGES={484--497}, MONTH={Mayo}, YEAR=1988 } @BOOK{kn:mis94, AUTHOR={Gina Miscovitch and David Simons}, TITLE={The {SCO} {P}erformance {T}uning {H}andbook}, PUBLISHER={Prentice Hall}, YEAR=1994 } @BOOK{kn:zim95a, AUTHOR={Phil Zimmermann}, TITLE={The Official {\sc pgp} User\'{}s Guide}, PUBLISHER={M.I.T. Press}, YEAR=1995 } @BOOK{kn:zim95b, AUTHOR={Phil Zimmermann}, TITLE={{\sc pgp}: Source Code and Internals}, PUBLISHER={M.I.T. Press}, YEAR=1995 } @INPROCEEDINGS{kn:cow98, AUTHOR={Crispin Cowan and others}, TITLE={Stack{G}uard: automatic adaptative detection and prevention of buffer--overflow attacks}, BOOKTITLE={Proceedings of the 7th {\sc usenix} Security Symposium}, PUBLISHER={The {\sc usenix} Association}, MONTH={Enero}, YEAR=1998 } @MISC{kn:sho00, AUTHOR={Adam Shostack}, TITLE={Security Code Review Guidelines}, YEAR=2000 } @INPROCEEDINGS{kn:cow00, AUTHOR={Crispin Cowan and Perry Wagle and Calton Pu and Steve Beattie and Jonathan Walpole}, TITLE={Buffer {O}verflows: {A}ttacks and {D}efenses for the {V}ulnerability of the {D}ecade}, BOOKTITLE={Proceedings of the {\sc sans} 2000 Conference}, PUBLISHER={The {\sc sans} Institute}, YEAR=2000 } @BOOK{kn:pep94, TITLE={Unix Unleashed}, AUTHOR={Susan Peppard and others}, PUBLISHER={Sams Publishing}, EDITION={1st}, YEAR=1994 } @TECHREPORT{kn:tom94, AUTHOR={Chris Tomlinson}, TITLE={A {P}ractical {G}uide to {S}olaris {S}ecurity}, INSTITUTION={Sun Microsystems (UK)}, MONTH={Marzo}, YEAR=1994 } @TECHREPORT{kn:hea90, AUTHOR={Richard Heady and George Luger and Arthur Maccabe and Mark Servilla}, TITLE={The architecture of a {N}etwork {L}evel {I}ntrusion {D}etection {S}ystem}, INSTITUTION={University of New Mexico}, NUMBER={CS90--20}, MONTH={Agosto}, YEAR=1990 } @MISC{kn:gra00, AUTHOR={Robert David Graham}, TITLE={Network {I}ntrusion {D}etection {S}ystems {FAQ} v. 0.8.3}, NOTE={http://www.robertgraham.com/pubs/network-intrusion-detection.html}, MONTH={Marzo}, YEAR=2000 } @ARTICLE{kn:sun96, AUTHOR={Aurobindo Sundaram}, TITLE={An introduction to {I}ntrusion {D}etection}, JOURNAL={Crossroads: The {ACM} Student Magazine}, NUMBER=4, VOLUME=2, MONTH={Abril}, YEAR=1996 } @TECHREPORT{kn:and80, AUTHOR={James P. Anderson}, TITLE={Computer Security Threat Monitoring and Surveillance}, INSTITUTION={James P. Anderson Co.}, MONTH={Abril}, YEAR=1980 } @ARTICLE{kn:ran00, AUTHOR={Marcus J. Ranum}, TITLE={The Network Police Blotter}, JOURNAL={;login:}, VOLUME=25, NUMBER=5, MONTH={Agosto}, PUBLISHER={The {\sc usenix} Association}, YEAR=2000 } @TECHREPORT{kn:ran98, AUTHOR={Marcus J. Ranum}, TITLE={Intrusion {D}etection: {C}hallenges and {M}yths}, INSTITUTION={Network Flight Recorder, Inc.}, YEAR=1998 } @TECHREPORT{kn:ell70, AUTHOR={J. H. Ellis}, TITLE={The possibility of {N}on--{S}ecret digital encryption}, INSTITUTION={CESG}, YEAR=1970, MONTH={Enero} } @TECHREPORT{kn:coc73, AUTHOR={C.C. Cocks}, TITLE={A note on non--secret encryption}, INSTITUTION={CESG}, YEAR=1973, MONTH={Noviembre} } @TECHREPORT{kn:wil74, AUTHOR={M. J. Williamson}, TITLE={Non--{S}ecret encryption using a finite field}, INSTITUTION={CESG}, YEAR=1974, MONTH={Enero} } @TECHREPORT{kn:wil76, AUTHOR={M. J. Williamson}, TITLE={Thoughts on cheaper {N}on--{S}ecret encryption}, INSTITUTION={CESG}, YEAR=1976, MONTH={Agosto} } @BOOK{kn:esc98, TITLE={Intrusion {D}etection: {N}etwork {S}ecurity beyond the {F}irewall}, AUTHOR={Terry Escamilla}, PUBLISHER={John Wiley and Sons}, YEAR=1998 } @INPROCEEDINGS{kn:roe99, AUTHOR={Martin Roesch}, TITLE={Snort -- {L}ightweight {I}ntrusion {D}etection for {N}etworks}, BOOKTITLE={Proceedings of the 13th Systems Administration Conference -- LISA\'{}99}, PUBLISHER={The {\sc usenix} Association}, MONTH={Noviembre}, YEAR=1999 } @TECHREPORT{kn:ids99, AUTHOR={Intrusion Detection System Consortium}, TITLE={Intrusion {D}etection {S}ystems buyer\'{}s guide}, INSTITUTION={{ICSA}.{NET}}, YEAR=1999 } @INPROCEEDINGS{kn:lun90, AUTHOR={Teresa F. Lunt}, TITLE={Detecting {I}ntruders in {C}omputer {S}ystems}, BOOKTITLE={Proceedings of the Sixth Annual Symposium and Technical Displays on Physical and Electronic Security}, YEAR=1990 } @PHDTHESIS{kn:jay95, AUTHOR={Justin Jay Lister}, TITLE={Intrusion {D}etection {S}ystems: an Introduction to the detection and prevention of computer abuse}, SCHOOL={University of Wollongong}, YEAR=1995 } @ARTICLE{kn:thu00, AUTHOR={Thuull}, TITLE={Anomaly {D}etection {S}ystems}, JOURNAL={2600: The {H}acker {Q}uartely}, NUMBER=3, VOLUME=17, MONTH={Primavera}, YEAR=2000 } @INPROCEEDINGS{kn:bus99, AUTHOR={Roland B\"uschkes and Mark Borning}, TITLE={Transaction--based {A}nomaly {D}etection}, BOOKTITLE={Proceedings of Workshop on Intrusion Detection and Network Monitoring}, ORGANIZATION={The {\sc usenix} Association}, MONTH={Abril}, YEAR=1999 } @PHDTHESIS{kn:ko96, AUTHOR={Calvin Cheuk Wang Ko}, TITLE={Execution Monitoring of Security--Critical Programs in a Distributed System: A Specification--Based Approach}, SCHOOL={University of California at Davis}, YEAR=1996 } @BOOK{kn:nor99, AUTHOR={Stephen Northcutt}, TITLE={Network Intrusion Detection: An Analyst\'{}s Handbook}, PUBLISHER={New Riders}, YEAR=1999 } @UNPUBLISHED{kn:spi01, TITLE={Know Your Enemy: {H}oneynets}, AUTHOR={Lance Spitzner}, NOTE={http://project.honeynet.org/papers/honeynet/}, INSTITUTION={The {H}oneynet {P}roject}, YEAR=2001 } @TECHREPORT{kn:ks94, TITLE={An {A}pplication of {P}attern {M}atching in {I}ntrusion {D}etection}, AUTHOR={Sandeep Kumar and Eugene Spafford}, INSTITUTION={Purdue University}, NUMBER={CSD-TR-94-013}, MONTH={Marzo}, YEAR=1994 } @TECHREPORT{kn:jv93, TITLE={The {NIDES} {S}tatistical {C}omponent: {D}escription and {J}ustification}, AUTHOR={Harold S. Javitz and Alfonso Valdes}, INSTITUTION={SRI International}, MONTH={Marzo}, YEAR=1993 } @INPROCEEDINGS{kn:ko97, AUTHOR={C. Ko, M. Ruschitzka and K. Levitt}, TITLE={Execution Monitoring of Security--Critical Programs in Distributed Systems: A Specification--Based Approach}, BOOKTITLE={Proceedings of the 1997 {\sc ieee} Symposium on Security and Privacy}, ORGANIZATION={{\sc ieee} Computer Society}, MONTH={Mayo}, PAGES={175--187}, YEAR=1997 } @TECHREPORT{kn:lu92, TITLE={A real--time intrusion detection expert system ({\sc ides}). Final technical report}, AUTHOR={Teresa F. Lunt and others}, INSTITUTION={SRI International}, MONTH={Febrero}, YEAR=1992 } @INPROCEEDINGS{kn:por92, AUTHOR={P.A. Porras and R.A. Kemmerer}, TITLE={Penetration state transition analysis: a rule--based intrusion detection approach}, BOOKTITLE={Proceedings of the 8th Computer Security Application Conference}, PAGES={220--229}, MONTH={Noviembre}, YEAR=1992 } @INPROCEEDINGS{kn:il93, AUTHOR={Koral Ilgun}, TITLE={{\sc ustat}: A real--time intrusion detection system for Unix}, BOOKTITLE={Proceedings of the 1993 Symposium on Security and Privacy}, ORGANIZATION={{\sc ieee} Computer Society}, PAGES={16--28}, MONTH={Mayo}, YEAR=1992 } @PHDTHESIS{kn:por92a, AUTHOR={Phillip A. Porras}, TITLE={{\sc stat}: {A} {S}tate {T}ransition {A}nalysis {T}ool for {I}ntrusion {D}etection}, SCHOOL={University of California}, MONTH={Junio}, YEAR=1992 } @INPROCEEDINGS{kn:sg91, AUTHOR={Shiuhpyng Winston Shieh and Virgil D. Gligor}, TITLE={A pattern--oriented intrusion model and its applications}, BOOKTITLE={Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy}, ORGANIZATION={{\sc ieee} Computer Society}, PAGES={327--342}, MONTH={Mayo}, YEAR=1991 } @INPROCEEDINGS{kn:gl91, AUTHOR={T.D. Garvey and Teresa F. Lunt}, TITLE={Model--based {I}ntrusion {D}etection}, BOOKTITLE={Proceedings of the 14th National Computer Security Conference}, PAGES={372--385}, MONTH={Octubre}, YEAR=1991 } @PHDTHESIS{kn:ku95, AUTHOR={Sandeep Kumar}, TITLE={Classification and {D}etection of {C}omputer {I}ntrusions}, SCHOOL={Purdue University}, MONTH={Agosto}, YEAR=1995 } @TECHREPORT{kn:ke98, TITLE={{\sc nstat}: {A} {M}odel--{B}ased {R}eal--{T}ime {N}etwork {I}ntrusion {D}etection {S}ystem}, AUTHOR={Richard A. Kemmerer}, INSTITUTION={University of California}, MONTH={Junio}, NUMBER={TRCS97-18}, YEAR=1998 } @TECHREPORT{kn:axe98b, TITLE={Research in Intrusion-Detection systems: A Survey}, AUTHOR={Stefan Axelsson}, INSTITUTION={Chalmers University of Technology}, MONTH={Diciembre}, NUMBER={98--17}, YEAR=1998 } @BOOK{kn:tan96, AUTHOR={Andrew Tanenbaum}, TITLE={Computer Networks}, PUBLISHER={Prentice Hall}, YEAR=1996 } @BOOK{kn:com95, AUTHOR={Douglas E. Comer}, TITLE={Internetworking with {\sc tcp/ip}. Volume 1: {P}rinciples, {P}rotocols \& {A}rchitecture}, PUBLISHER={Prentice Hall}, EDITION={3rd}, YEAR=1995 } @MISC{kn:fyo98, AUTHOR={Fyodor}, TITLE={{R}emote {OS} detection via {\sc tcp/ip} {S}tack {F}ingerprinting}, NOTE={http://www.insecure.org/nmap/nmap-fingerprinting-article.html}, MONTH={Octubre}, YEAR=1998 } @MISC{kn:rfc1498, AUTHOR={Steven M. Bellovin}, TITLE={{RFC1498}: Defending Against Sequence Number Attacks}, MONTH={Mayo}, ORGANIZATION={Internet Activities Board}, YEAR=1996 } @MISC{kn:fly00b, AUTHOR={Hal Flynn}, TITLE={Back to the {B}asics: {S}olaris and inetd.conf}, NOTE={http://www.securityfocus.com/focus/sun/articles/inetd[1,2].html}, MONTH={Marzo}, YEAR=2000 } @MISC{kn:fly00a, AUTHOR={Hal Flynn}, TITLE={Back to the {B}asics: {S}olaris default processes and init.d, part {III}}, NOTE={http://www.securityfocus.com/focus/sun/articles/b5.html}, MONTH={Junio}, YEAR=2000 } @MISC{kn:sun98, AUTHOR={Sun Microsystems}, TITLE={Solaris 7 {S}ystem {A}dministration {G}uide, {V}olume {I}}, NOTE={http://docs.sun.com/}, MONTH={Octubre}, YEAR=1998 } @BOOK{kn:mau00, AUTHOR={Jim Mauro and Richard McDougall}, TITLE={Solaris {I}nternals: {C}ore {K}ernel {A}rchitecture}, PUBLISHER={Prentice Hall and Sun Microsystems Press}, EDITION={1st}, YEAR=2000 } @BOOK{kn:gre99, AUTHOR={Peter H. Gregory}, TITLE={Solaris {S}ecurity}, PUBLISHER={Prentice Hall and Sun Microsystems Press}, EDITION={1st}, YEAR=1999 } @MANUAL{kn:vas01, TITLE={The {S}olaris {F}ingerprint {D}atabase -- {A} {S}ecurity {T}ool for {S}olaris {O}perating {E}nvironment {F}iles}, AUTHOR={Vasanthan Dasan and Alex Noordergraaf and Lou Ordorica}, ORGANIZATION={Sun Microsystems}, MONTH={Mayo}, NOTE={Sun BluePrints OnLine}, YEAR=2001 } @BOOK{kn:tox00, AUTHOR={Bob Toxen}, TITLE={Real {W}orld {L}inux {S}ecurity: {I}ntrusion {P}revention, {D}etection and {R}ecovery}, PUBLISHER={Prentice Hall}, EDITION={1st}, YEAR=2000 } @BOOK{kn:ano01, AUTHOR={Anonymous}, TITLE={Maximum {L}inux {S}ecurity: a hacker\'{}s guide to protecting your {L}inux Server and Workstation}, PUBLISHER={Sams Publishing}, YEAR=2001 } @BOOK{kn:bal00, TITLE={Red Hat Linux 7 Unleashed}, AUTHOR={Bill Ball and David Pitts and William Ball}, PUBLISHER={Sams Publishing}, YEAR=2000 } @BOOK{kn:ha99, TITLE={Slackware Linux Unleashed}, AUTHOR={Bao Ha and Tina Nguyen and others}, PUBLISHER={Sams Publishing}, YEAR=1999 } @MANUAL{kn:noo01, TITLE={The {S}olaris {S}ecurity {T}oolkit -- {I}nternals}, AUTHOR={Alex Noordergraaf and Glenn Brunette}, ORGANIZATION={Sun Microsystems}, MONTH={Junio}, NOTE={Sun BluePrints OnLine}, YEAR=2001 } @MANUAL{kn:noo01b, TITLE={The {S}olaris {S}ecurity {T}oolkit -- {I}nstallation, {C}onfiguration and {U}sage {G}uide}, AUTHOR={Alex Noordergraaf and Glenn Brunette}, ORGANIZATION={Sun Microsystems}, MONTH={Junio}, NOTE={Sun BluePrints OnLine}, YEAR=2001 } @MANUAL{kn:noo01c, TITLE={The {S}olaris {S}ecurity {T}oolkit -- {Q}uick {S}tart}, AUTHOR={Alex Noordergraaf and Glenn Brunette}, ORGANIZATION={Sun Microsystems}, MONTH={Junio}, NOTE={Sun BluePrints OnLine}, YEAR=2001 } @MANUAL{kn:noo01d, TITLE={The {S}olaris {S}ecurity {T}oolkit -- {R}elease {N}otes}, AUTHOR={Alex Noordergraaf and Glenn Brunette}, ORGANIZATION={Sun Microsystems}, MONTH={Junio}, NOTE={Sun BluePrints OnLine}, YEAR=2001 } @MANUAL{kn:noo01e, TITLE={Building a {J}ump{S}tart {I}nfrastructure}, AUTHOR={Alex Noordergraaf}, ORGANIZATION={Sun Microsystems}, MONTH={Abril}, NOTE={Sun BluePrints OnLine}, YEAR=2001 } @MANUAL{kn:bet00, TITLE={IBM {C}ertification {S}tudy {G}uide. {AIX} v4.3 {S}ystem {A}dministration}, AUTHOR={Scott Vetter and others}, ORGANIZATION={IBM}, NOTE={IBM RedBook SG24--5129--00}, YEAR=2000 } @INPROCEEDINGS{kn:tom75, AUTHOR={Raymond S. Tomlinson}, TITLE={Selecting {S}equence {N}umbers}, BOOKTITLE={Proceedings of {\sc sigcomm/sigops} {I}nterprocess {C}ommunication {W}orkshop}, ORGANIZATION={ACM}, PAGES={11--23}, YEAR=1975 } @MISC{kn:det01, AUTHOR={Dethy}, TITLE={Examining portscan methods -- {A}nalysing {A}udible {T}echniques}, NOTE={http://www.synnergy.net/downloads/papers/portscan.txt}, ORGANIZATION={Synnergy Networks}, MONTH={January}, YEAR=2001 } @MISC{kn:kla95, AUTHOR={Christopher Klaus}, TITLE={Stealth {S}canning -- {B}ypassing {F}irewalls and {\sc satan} {D}etectors}, NOTE={Internet Security Systems, Inc.}, MONTH={Diciembre}, YEAR=1995 } @ARTICLE{kn:mai96, TITLE={Port {S}canning without the {\sc syn} flag}, AUTHOR={Uriel Maimon}, JOURNAL={Phrack Magazine}, NUMBER=49, VOLUME=7, YEAR=1996 } @MISC{kn:ark99, AUTHOR={Ofir Arkin}, TITLE={Network {S}canning {T}echniques}, NOTE={PubliCom Communications Solutions}, MONTH={Noviembre}, YEAR=1999 } @INPROCEEDINGS{kn:tod96, AUTHOR={L. Todd Heberlein and Matt Bishop}, TITLE={Attack Class: Address Spoofing}, BOOKTITLE={Proceedings of the 19th National Information Systems Security Conference}, MONTH={Octubre}, PAGES={371--377}, YEAR=1996 } @ARTICLE{kn:dae96b, TITLE={{IP}--{S}poofing Demystified}, AUTHOR={Daemon9}, JOURNAL={Phrack Magazine}, NUMBER=48, VOLUME=7, MONTH={Junio}, YEAR=1996 } @ARTICLE{kn:bel89, TITLE={Security problems in the {\sc tcp/ip} {P}rotocol {S}uite}, AUTHOR={Steven M. Bellovin}, JOURNAL={Computer Communications Review}, NUMBER=2, VOLUME=19, MONTH={Abril}, PAGES={32--48}, YEAR=1989 } @TECHREPORT{kn:mor85, TITLE={A {W}eakness in the 4.2{\sc bsd} {U}nix {\sc tcp/ip} {S}oftware}, AUTHOR={Robert Morris}, INSTITUTION={{\sc AT}\&{\sc T} Bell Laboratories}, NUMBER={CSTR--117}, YEAR=1985 } @MISC{kn:ris01, TITLE={An overview of some the current spoofing threats}, AUTHOR={Neil B. Riser}, NOTE={The {SANS} {I}nstitute}, MONTH={Julio}, YEAR=2001 } @TECHREPORT{kn:fel96, AUTHOR={Edward W. Felten and Dirk Balfanz and Drew Dean and Dan S. Wallach}, TITLE={Web {S}poofing: an {I}nternet {C}on {G}ame}, INSTITUTION={Princeton University Department of Computer Science}, NUMBER={540--96}, NOTE={Revisado en febrero de 1997}, YEAR=1996 } @MISC{kn:vol97, AUTHOR={Yuri Volobuev}, TITLE={Playing redir games with {\sc arp} and {\sc icmp}}, MONTH={Septiembre}, YEAR=1997 } @TECHREPORT{kn:hou01, AUTHOR={Kevin J. Houle and George M. Weaver}, TITLE={Trends in {D}enial of {S}ervice Attack Technology}, INSTITUTION={CERT Coordination Center, Carnegie Mellon University}, MONTH={Octubre}, YEAR=2001 } @BOOK{kn:won01, AUTHOR={Chris Wong}, TITLE={HP-UX 11i Security}, PUBLISHER={Prentice Hall}, MONTH={Septiembre}, YEAR=2001 } @BOOK{kn:reh00, AUTHOR={Rafeeg Rehman}, TITLE={HP Certified: HP-UX System Administration}, PUBLISHER={Prentice Hall}, MONTH={Mayo}, YEAR=2000 } @BOOK{kn:pon01, AUTHOR={Marty Poniatowski and Martin Poniatowski}, TITLE={HP-UX 11i System Administration Handbook and Toolkit}, PUBLISHER={Prentice Hall}, MONTH={Abril}, YEAR=2001 } @MANUAL{kn:hp00, TITLE={Managing Systems and Workgroups: A Guide for HP-UX System Administrators}, AUTHOR={Hewlett--Packard}, ORGANIZATION={Hewlett--Packard}, NOTE={HP Part Number B2355--90701}, YEAR=2000 } @MANUAL{kn:ibm97, TITLE={{AIX} {V}ersion 4.3 {S}ystem {M}anagement {G}uide: {O}perating {S}ystem and {D}evices}, AUTHOR={IBM}, ORGANIZATION={IBM}, NOTE={IBM RedBook SC23--2529}, MONTH={Octubre}, YEAR=1997 } @MANUAL{kn:ibm00, TITLE={{AIX} 4.3 {E}lements of {S}ecurity. {E}ffective and {E}fficient {I}mplementation}, AUTHOR={IBM}, ORGANIZATION={IBM}, NOTE={IBM RedBook SG24--5962-00}, MONTH={Agosto}, YEAR=2000 } @MANUAL{kn:ibm97b, TITLE={{AIX} {V}ersion 4.3 {S}ystem {M}anagement {G}uide: {C}ommunication and {N}etworks}, AUTHOR={IBM}, ORGANIZATION={IBM}, NOTE={IBM RedBook SC23--4127}, MONTH={Octubre}, YEAR=1997 } @MANUAL{kn:ibm00b, TITLE={{IBM} {C}ertification {S}tudy {G}uide. {AIX} {P}roblem {D}etermination {T}ools and {T}echniques}, AUTHOR={IBM}, ORGANIZATION={IBM}, NOTE={IBM RedBook SG24--6185-00}, MONTH={Diciembre}, YEAR=2000 } @UNPUBLISHED{kn:ste98b, TITLE={Building a bastion host using {HP-UX} 10}, AUTHOR={Kevin Steves}, NOTE={http://people.hp.se/stevesk/bastion10.html}, INSTITUTION={Hewlett-Packard Company}, YEAR=1998 } @UNPUBLISHED{kn:ste00, TITLE={Building a bastion host using {HP-UX} 11}, AUTHOR={Kevin Steves}, NOTE={http://people.hp.se/stevesk/bastion11.html}, INSTITUTION={Hewlett-Packard Company}, YEAR=2000 } @MANUAL{kn:hp96, TITLE={Managing {HP-UX} software with {SD-UX}}, AUTHOR={Hewlet-Packard}, ORGANIZATION={HP}, NOTE={HP Part Number B2355-90107}, MONTH={Enero}, YEAR=1996 } @MANUAL{kn:hp00b, TITLE={HP-UX {P}atch {M}anagement: a guide to patching {HP-UX} 10.x systems}, AUTHOR={Hewlett--Packard}, ORGANIZATION={Hewlett--Packard}, NOTE={HP Part Number B3782--90828}, MONTH={Enero}, YEAR=2000 } @MISC{kn:hpfaq, AUTHOR={Ian P. Springer}, TITLE={{HP-UX} {FAQ}}, NOTE={http://www.faqs.org/faqs/hp/hpux-faq/}, VERSION={11.20.0111}, MONTH={Noviembre}, YEAR=2001 } @MANUAL{kn:noo99, TITLE={{S}olaris {O}perating {E}nvironment {N}etwork {S}ettings for {S}ecurity}, AUTHOR={Alex Noordergraaf and Keith Watson}, ORGANIZATION={Sun Microsystems}, MONTH={Diciembre}, NOTE={Sun BluePrints OnLine}, YEAR=1999 } @BOOK{kn:kru00, AUTHOR={Jeff Crume}, TITLE={Inside Internet Security: What hackers don\'{}t want you to know}, PUBLISHER={Addison Wesley}, YEAR=2000 } @BOOK{kn:bai97, AUTHOR={Edward C. Bailey}, TITLE={Maximum {\sc rpm}: {T}aking the {R}ed {H}at {P}ackage {M}anager to the limit}, PUBLISHER={Red Hat Software, Inc.}, YEAR=1997 } @BOOK{kn:phone02, AUTHOR={Dameon D. Welch-Abernathy}, TITLE={Essential Checkpoint Firewall-1: An Installation, Configuration, and Troubleshooting Guide}, PUBLISHER={Addison Wesley}, YEAR=2002 } @BOOK{kn:cap01, AUTHOR={David W. Chapman Jr. and Andy Fox}, TITLE={Cisco\copyright\ Secure PIX\copyright\ Firewalls}, PUBLISHER={Cisco Press}, YEAR=2001 } @UNPUBLISHED{kn:spi01b, TITLE={{I}ntrusion {D}etection for {C}heck {P}oint {F}ire{W}all--1}, AUTHOR={Lance Spitzner}, NOTE={http://www.enteract.com/\~{}lspitz/intrusion.html}, INSTITUTION={The {H}oneynet {P}roject}, MONTH={Diciembre}, YEAR=2001 } @UNPUBLISHED{kn:rus02, TITLE={Linux 2.4 {P}acket {F}iltering {HOWTO} v. 1.2}, AUTHOR={Rusty Russell}, NOTE={http://netfilter.samba.org/documentation/HOWTO/packet-filtering-HOWTO.txt}, YEAR=2002 } @UNPUBLISHED{kn:gren00, TITLE={Firewall and {P}roxy {S}erver {HOWTO}}, AUTHOR={Mark Grennan}, NOTE={http://www.linuxdoc.org/HOWTO/Firewall-HOWTO.html}, YEAR=2000 } @BOOK{kn:zie01, AUTHOR={Robert L. Ziegler}, TITLE={Linux {F}irewalls}, PUBLISHER={New Riders}, EDITION={2nd}, YEAR=2001 } @ARTICLE{kn:mcc00, TITLE={{IP} {F}ilter on {S}olaris}, AUTHOR={Ron McCarthy}, JOURNAL={Sys Admin Magazine}, NOTE={Solaris Suplement}, YEAR=2000 } @UNPUBLISHED{kn:her00, TITLE={User {A}uthentication {HOWTO}}, AUTHOR={Peter Hernberg}, NOTE={http://www.tldp.org/HOWTO/User-Authentication-HOWTO/}, MONTH={Mayo}, YEAR=2000 } @UNPUBLISHED{kn:coh99, TITLE={Simulating {C}yber {A}ttacks, {D}efenses and {C}onsequences}, AUTHOR={Fred Cohen}, NOTE={http://all.net/journal/ntb/simulate/simulate.html}, MONTH={Mayo}, YEAR=1999 } @ARTICLE{kn:vel02, AUTHOR={Juan Miguel Velasco L\'opez--Urda}, TITLE={Seguridad bajo control: {\it `outsourcing vs. in house'}, las claves para evaluar}, JOURNAL={Seguridad en Inform\'atica y Comunicaciones}, NUMBER=49, MONTH={Abril}, YEAR=2002 } @TECHREPORT{kn:iso, AUTHOR={British Standard}, TITLE={Information technology -- {C}ode of practice for information security management}, INSTITUTION={British Standard Publishing Limited}, YEAR=2000, MONTH={Diciembre}, NUMBER={BS ISO/IEC 17799:2000} } @TECHREPORT{kn:oss, AUTHOR={Pete Herzot and others}, TITLE={Open--{S}ource {S}ecurity {T}esting {M}ethodology {M}anual v2.0}, INSTITUTION={The Ideahamster Organization}, MONTH={Febrero}, YEAR=2002, } @TECHREPORT{kn:nist97, AUTHOR={Barbara Guttman and Robert Bagwill}, TITLE={Internet {S}ecurity {P}olicy: {A} {T}echnical {G}uide}, INSTITUTION={National Institute of Standards and Technology}, MONTH={Julio}, YEAR=1997 } @ARTICLE{kn:skl01, TITLE={The {AIX} {E}rror {L}ogging {F}acility}, AUTHOR={Sandor W. Sklar}, JOURNAL={Sys Admin}, MONTH={Junio}, VOLUME=10, NUMBER=6, NOTE={AIX Administration Supplement}, YEAR=2001 } @MISC{kn:bha01, TITLE={{AIX} 4.3 Bastion Host Guidelines}, AUTHOR={Nishchal Bhalla}, NOTE={The {SANS} {I}nstitute}, MONTH={Junio}, YEAR=2001 } @MANUAL{kn:ibm97c, TITLE={{AIX} {V}ersion 4.3 {P}roblem {S}olving {G}uide and {R}eference}, AUTHOR={IBM}, ORGANIZATION={IBM}, NOTE={IBM RedBook SC23--4123}, MONTH={Octubre}, YEAR=1997 }