End-to-End Arguments in System Design (Classic Paper)
RFC791: Internet Protocol
RFC792: Internet Control Message Protocol (ICMP)
RFC768: User Datagram Protocol (UDP)
RFC793: Transmission Control Protocol (TCP) (1981)
RFC9293: Transmission Control Protocol (TCP) (2022)
SYN Cookies Description in RFC 4987: TCP SYN Flooding Attacks and Common Mitigations
Host-to-Host Congestion Control for TCP
nmap.org
Introduction to Network Forensics booklet
How Great is the Great Firewall? Measuring China’s DNS Censorship
Examining How the Great Firewall Discovers Hidden Circumvention Servers
Analyzing the Great Firewall of China Over Space and Time (using port scans)
iptables man page
RFC 826: An Ethernet Address Resolution Protocol
RFC 4861: Neighbor Discovery for IP version 6 (IPv6)
netinet/ip.h
netinet/tcp.h
Open Shortest Path First (OSPF) Protocol Version 2 - RFC 2328
Host-to-Host Congestion Control for TCP
UDP Hole Punching
Ubuntu help page on ServersBehindNAT
Why secure systems require random numbers
Random Numbers in Data Security Systems
Behind Intel's New Random-Number Generator
RFC 4086: Randomness Requirements for Security
Notes on Transport Layer Security
List of trusted Certifying Authorities by Google Chrome
Example of Certifying Authority Pricing
X.509 Standard Complete Document
RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
RFC 4033: DNS Security Introduction and Requirements
RFC 2309: Recommendations on Queue Management and Congestion Avoidance in the Internet
Live Cyber Attack Map for Visualizing Digital Threat Incidents
Controlling Applications by Managing Network Characteristics