Communications and Computer Network Protocol Design Models
network stack (dod): What each layer does - attack patterns on each layer - & how to defend it
network intrusion detection system
analyzer
network intrusion detection system for host/network