ABSTRACT
It has been nearly twenty years since I published the Berferd paper. Much of it is quite outdated, reflecting the state of technology at the time. But it did touch a number of issues that have become quite important. I discuss some of the existing conditions around the time of the paper, and some of these issues.
- the month of php security. http://php-security.org/index.html, 2010.Google Scholar
- Steven M. Bellovin. There be dragons. In Proceedings of the Third Usenix Unix Security Symposium, pages 1--16, September 1992.Google Scholar
- Steven M. Bellovin. Packets found on an internet. Computer Communications Review, 23(3):26--31, July 1993. Google ScholarDigital Library
- Bill Cheswick and Steve Bellovin. Firewalls et sécurité Internet. Addison-Wesley France, 1996.Google Scholar
- Bill Cheswick, Hal Burch, and Steve Branigan. Mapping and visualizing the internet. In Usenix, 2000. Google ScholarDigital Library
- William R. Cheswick. The design of a secure internet gateway. In Proc. Summer USENIX Conference, Anaheim, CA, June 1990.Google Scholar
- William R. Cheswick. An evening with Berferd, in which a cracker is lured, endured, and studied. In Proc. Winter USENIX Conference, pages 163--174, San Francisco, CA, January 1992.Google Scholar
- William R. Cheswick and Steven M. Bellovin. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley, Reading, MA, first edition. 1994. Google ScholarDigital Library
- William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin. Firewalls and Internet Security; Repelling the Wily Hacker. Addison-Wesley, Reading, MA, second edition, 2003. Google ScholarDigital Library
- F. Cohen. Computer viruses: theory and experiments. Comput. Secur., 6(1):22--35, 1987. Google ScholarDigital Library
- Fred Cohen. Depection toolkit, http://all.net/, 1998.Google Scholar
- Dorothy E. Denning and Peter J. Denning. Internet Besieged. Addison Wesley Professional, 1997.Google Scholar
- DoD trusted computer system evaluation criteria. DoD 5200.28-STD, DoD Computer Security Center, 1985.Google Scholar
- Tom Duff. Experience with viruses on UNIX systems. j-COMP-SYS, 2(2):155--171, Spring 1989.Google Scholar
- M. W. Eichin and J. A. Rochlis. With microscope and tweezers: An analysis of the Internet virus of november 1988. In Proc. IEEE Symposium on Research in Security and Privacy, pages 326--345, Oakland, CA, May 1989.Google ScholarCross Ref
- A. G. Fraser. Proc. icc. pages 20.1.1--20.1.3, June 1979.Google Scholar
- George Friedman. The stuxnet computer worm and the iranian nuclear program---stratfor. http://www.stratfor.com/analysis/20100924_stuxnet_computer_worm_and_iranian_nuclear_program, 2010.Google Scholar
- David Goldsmith and Michael Schiffman. Firewalking: A traceroute-like analysis of IP packet responses to determine gateway access control lists, 1998.Google Scholar
- Stephen J. Gould. Wonderful Life: The Burgess Shale and the Nature of History. W. W. Norton and Company, 1990.Google Scholar
- M. Handley, C. Kreibich, and V. Paxson. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. Proceedings of the USENIX Security Symposium, pages 115--131, 2001. Google ScholarDigital Library
- Paul A. Karger and Roger R. Schell. Multics security evaluation: Vulnerability analysis, Volume II. Technical Report ESD-TR-74-193, HQ Electronic Systems Division: Hanscom AFB, MA, June 1974.Google Scholar
- Douglas Maughan. The need for a national cybersecurity research and development agenda. Commun. ACM, 53(2):29--31, 2010. Google ScholarDigital Library
- Peter G. Neumann, Matt Bishop, Sean Peisert, and Marv Schaefer. Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy. In Proceedings of the 31st IEEE Symposium on Security and Privacy, Oakland/Berkeley, CA, May 16--19, 2010. Google ScholarDigital Library
- David L. Presotto. Upas---a simpler approach to network mail. In USENIX Conference Proceedings, pages 533--538, Portland, OR, Summer 1985.Google Scholar
- J. H. Saltzer, D. P. Reed, and D. D. Clark. End-to-end arguments in system design. ACM Trans. Comput. Syst., 2(4):277--288, 1984. Google ScholarDigital Library
- Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems, 1975.Google Scholar
- Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson. Practical network support for ip traceback. pages 295--306, 2000. Google ScholarDigital Library
- Bruce Schneier. The stuxnet worm. http://www.schneier.com/blog/archives/2010/09/the_stuxnet_wor.html, 2010.Google Scholar
- Cliff Stoll. Stalking the wily hacker. Communications of the ACM, 31(5):484, May 1988. Google ScholarDigital Library
Index Terms
- Back to Berferd
Recommendations
A feed back retrial queueing system with two types of arrivals
QTNA '11: Proceedings of the 6th International Conference on Queueing Theory and Network ApplicationsA retrial queueing system with two types of customers and with feed back is considered. Type 1 customers arrive in batches of size k with probability ck and type 2 customers arrive singly according to two Poisson processes with rates [EQUATION] and λ2 ...
The virtual haptic back for palpatory training
ICMI '04: Proceedings of the 6th international conference on Multimodal interfacesThis paper discusses the Ohio University Virtual Haptic Back (VHB) project, including objectives, implementation, and initial evaluations. Haptics is the science of human tactile sensation and a haptic interface provides force and touch feedback to the ...
Queueing system MAP/M/N as a model of call center with call-back option
ASMTA'12: Proceedings of the 19th international conference on Analytical and Stochastic Modeling Techniques and ApplicationsA multi-server queueing system with a Markovian Arrival Process (MAP), an infinite buffer and impatient customers useful in modeling a call center with a call-back option is investigated. The service time of a customer by a server has an exponential ...
Comments