[Avol94] Frederick Avolio and Marcus Ranum. A Network
Perimeter With Secure Internet Access. In Internet
Society Symposium on Network and Distributed System
Security, pages 109-119. Internet Society, February 2-4
[Bel89] Steven M. Bellovin. Security Problems in the
TCP/IP Protocol Suite. Computer Communications Review,
9(2):32-48, April 1989.
[Cerf93] Vinton Cerf. A National Information
Infrastructure. Connexions, June 1993.
[CERT94] Computer Emergency Response Team/Coordination
Center. CA-94:01, Ongoing Network Monitoring Attacks.
Available from FIRST.ORG, pub/alerts/cert9401.txt,
[Chap92] D. Brent Chapman. Network (In)Security Through
IP Packet Filtering. In USENIX Security Symposium III
Proceedings, pages 63-76. USENIX Association, September
[Ches94] William R. Cheswick and Steven M. Bellovin.
Firewalls and Internet Security. Addison-Wesley, Reading,
[CIAC94a] Computer Incident Advisory Capability. Number
e-07, unix sendmail vulnerabilities update. Available
from FIRST.ORG, file pub/alerts/e-07.txt, January 1994.
[CIAC94b] Computer Incident Advisory Capability. Number
e-09, network monitoring attacks. Available from
FIRST.ORG, pub/alerts/e-09.txt, February 1994.
[CIAC94c] Computer Incident Advisory Capability. Number
e-14, wuarchive ftpd trojan horse. Available from
FIRST.ORG, pub/alerts/e-14.txt, February 1994.
[Com91a] Douglas E. Comer. Internetworking with TCP/IP:
Principles, Protocols, and Architecture. Prentice-Hall,
Englewood Cliffs, NJ, 1991.
[Com91b] Douglas E. Comer and David L. Stevens.
Internetworking with TCP/IP:Design, Implementation, and
Internals. Prentice-Hall, Englewood Cliffs, NJ, 1991.
[Cur92] David Curry. UNIX System Security: A Guide for
Users and System Administrators. Addison-Wesley, Reading,
[Farm93] Dan Farmer and Wietse Venema. Improving the
security ofyour site by breaking into it. Available from