Back to Results
First PageMeta Content
Internet / Cyberwarfare / Internet standards / Network performance / Data security / Firewall / Packet loss / Transmission Control Protocol / Denial-of-service attack / Computer network security / Computing / Network architecture


Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics Mark Handley and Vern Paxson AT&T Center for Internet Research at ICSI (ACIRI) International Computer Science Institute Berke
Add to Reading List

Document Date: 2001-05-27 00:48:06


Open Document

File Size: 554,17 KB

Share Result on Facebook

/

Event

Natural Disaster / /

Facility

T Center / /

IndustryTerm

ultimate processing / end-systems / diagnostics tools / diagnostic protocol / Host-based systems / internal routers / well-behaved network protocols / Internet protocols / large site / Internet Exchange / Internet protocol specifications / network intrusion detection systems / option processing / security systems / particular protocol / external site / search algorithm / internal site / constant-complexity hash algorithms / search algorithms / internal network / /

Organization

Christian Kreibich Institut f¨ur Informatik Technische Universit¨at M¨unchen / Maximum Transmission Unit / Vern Paxson AT&T Center for Internet Research / /

Person

Patsy Victim / Mark Handley / Christian Kreibich / /

Position

Version Head / administrator / /

Technology

search algorithm / 0 DFMF Protocol / firewall / internal Diffserv-enabled router / well-behaved network protocols / search algorithms / IP / particular protocol / Internet protocols / MTU / operating system / constant-complexity hash algorithms / UDP / TCP/IP protocol / operating systems / TCP/IP / Maximum Transmission Unit / /

SocialTag