<--- Back to Details
First PageDocument Content
Data / IP traceback / Denial-of-service attack / IP address spoofing / IP fragmentation attacks / Firewall / Transmission Control Protocol / Ping / Communications protocol / Computer network security / Computing / Network architecture
Date: 2007-07-15 10:32:33
Data
IP traceback
Denial-of-service attack
IP address spoofing
IP fragmentation attacks
Firewall
Transmission Control Protocol
Ping
Communications protocol
Computer network security
Computing
Network architecture

Pi: A Path Identification Mechanism to Defend against DDoS Attacks Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.edu Abstract

Add to Reading List

Source URL: www.cs.berkeley.edu

Download Document from Source Website

File Size: 209,73 KB

Share Document on Facebook

Similar Documents

FAIR: Forwarding Accountability for Internet Reputability Christos Pappas Raphael M. Reischuk  Adrian Perrig

FAIR: Forwarding Accountability for Internet Reputability Christos Pappas Raphael M. Reischuk Adrian Perrig

DocID: 1pAFq - View Document

2015 IEEE Symposium on Security and Privacy  Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, †

2015 IEEE Symposium on Security and Privacy Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, †

DocID: 1pcUO - View Document

Protecting Wireless Networks from Identity Theft (Spoofing) using the spatial correlation of received signal strength. GudipudiChandanaTheja MTech Student Dapartment of Computer Science Engineering ST.Mary’s Gr oup of

Protecting Wireless Networks from Identity Theft (Spoofing) using the spatial correlation of received signal strength. GudipudiChandanaTheja MTech Student Dapartment of Computer Science Engineering ST.Mary’s Gr oup of

DocID: 1oWdd - View Document

White Paper  The Importance of a Resilient DNS and DHCP Infrastructure DNS and DHCP availability and integrity increase in importance with the business dependence on IT systems

White Paper The Importance of a Resilient DNS and DHCP Infrastructure DNS and DHCP availability and integrity increase in importance with the business dependence on IT systems

DocID: 1nXVw - View Document

S/Kademlia:  A Practicable Approach Towards Secure Key-Based Routing

S/Kademlia: A Practicable Approach Towards Secure Key-Based Routing

DocID: 1guge - View Document