• End-to-End Arguments in System Design (Classic Paper)
  • RFC791: Internet Protocol
  • RFC792: Internet Control Message Protocol (ICMP)
  • RFC768: User Datagram Protocol (UDP)
  • RFC793: Transmission Control Protocol (TCP) (1981)
  • RFC9293: Transmission Control Protocol (TCP) (2022)
  • SYN Cookies Description in RFC 4987: TCP SYN Flooding Attacks and Common Mitigations
  • Host-to-Host Congestion Control for TCP
  • nmap.org
  • Introduction to Network Forensics booklet
  • How Great is the Great Firewall? Measuring China’s DNS Censorship
  • Examining How the Great Firewall Discovers Hidden Circumvention Servers
  • Analyzing the Great Firewall of China Over Space and Time (using port scans)
  • iptables man page
  • RFC 826: An Ethernet Address Resolution Protocol
  • RFC 4861: Neighbor Discovery for IP version 6 (IPv6)
  • netinet/ip.h
  • netinet/tcp.h
  • Open Shortest Path First (OSPF) Protocol Version 2 - RFC 2328
  • Host-to-Host Congestion Control for TCP
  • UDP Hole Punching
  • Ubuntu help page on ServersBehindNAT
  • Why secure systems require random numbers
  • Random Numbers in Data Security Systems
  • Behind Intel's New Random-Number Generator
  • RFC 4086: Randomness Requirements for Security
  • Notes on Transport Layer Security
  • List of trusted Certifying Authorities by Google Chrome
  • Example of Certifying Authority Pricing
  • X.509 Standard Complete Document
  • RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
  • RFC 4033: DNS Security Introduction and Requirements
  • RFC 2309: Recommendations on Queue Management and Congestion Avoidance in the Internet
  • Live Cyber Attack Map for Visualizing Digital Threat Incidents
  • Controlling Applications by Managing Network Characteristics