Back to Results
First PageMeta Content
Computer network security / Cyberwarfare / Internet standards / Data security / Firewall / Wireless sensor network / Border Gateway Protocol / Anycast / Transmission Control Protocol / Network architecture / Computing / Internet


Toward Understanding Distributed Blackhole Placement Evan Cooke, Michael Bailey, Z. Morley Mao, Danny McPherson David Watson, Farnam Jahanian University of Michigan Arbor Networks
Add to Reading List

Document Date: 2004-11-02 14:39:14


Open Document

File Size: 436,88 KB

Share Result on Facebook

City

San Francisco / Washington / DC / Washington / D.C. / Hamburg / /

Company

Arbor Networks / Autonomous Systems / Cisco Systems / Qwest / BGP Sensor Provider Networks / Symantec Corp. / Microsoft Corporation / /

Country

Germany / United States / China / /

Currency

USD / /

/

Facility

UDP port / SANS Institute / TCP port / Farnam Jahanian University of Michigan Arbor Networks / University of Michigan / /

IndustryTerm

random scanning algorithm / backup services / university network / sensor site / random propagation algorithms / external Internet / blackhole infrastructure / Network intrusion detection systems / Internet worm activity / collection infrastructure / cable modem networks / external networks / Internet Motion Sensor Architecture The IMS architecture / stub networks / blackhole sensor network / Internet threats / Internet traffic / Internet Background Radiation / data processing / Internet Aggregator / real-time data analysis / obvious solution / Internet Motion Sensor / large company enterprise networks / Internet worms / unused Internet address space / distributed global scoped Internet threat monitoring system / traffic planning tools / external network / Internet Motion Sensor Permission / Internet Routing Convergence / fine-grained flow analysis tools / open university campus networks / policy enforcement devices / business site / host-based honeypot tools / university networks / Internet storm center / routed Internet address space / target selection algorithms / /

MusicGroup

Shining / /

OperatingSystem

Linux / DoS / Microsoft Windows / /

Organization

University of Michigan / USENIX Association / Farnam Jahanian University of Michigan Arbor Networks / Cooperative Association for Internet Data Analysis / /

Person

Chris Morrow / Nicholas Weaver / Craig Labovitz / Dan Golding / David Watson / Michael Bailey / David Moore / Geoffrey M. Voelker / Rob Malan / Manish Karir / Ramesh Govindan / Robert Stone / Stefan Savage / P. Barford / V / Randy Katz / Lance Spitzner / Colleen Shannon / Bert Rossi / Stuart Staniford / G. Robert Malan / Abha Ahuja / Zhuoqing Morley Mao / Larry Blunk / Evan Cooke / George Varghese / Dug Song / Vern Paxson / Jose Nazario / Brian Gemberling / /

Position

editor / Invasive Software General / representative / /

Product

Microsoft Corporation Portable Audio Device / /

ProvinceOrState

Michigan / California / /

Region

Northeastern US / /

Technology

Radiation / cable modem / Linux / perfectly uniformly random scanning algorithm / html / UDP / Operating Systems / specific protocol / 4.2 Propagation strategy Worm target selection algorithms / scanning algorithms / random propagation algorithms / DNS / firewall / http / ISP / time algorithms / IPv4 / 24 All protocols / /

URL

http /

SocialTag