IP traceback

Results: 42



#Item
11Internet protocols / IP traceback / Computer network security / Data / Routing protocols / Information / Bloom filter / Hashing / Computing

2004 IEEE Symposium on Security and Privacy Large-Scale IP Traceback in High-Speed Internet Jun (Jim) Xu Networking & Telecommunications Group College of Computing

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2004-11-09 21:06:23
12Computer networking / IP traceback / Internet / Markov chain / Data / Packet switching / Firewall / Transmission Control Protocol / Computing / Markov processes / Markov models

32 International Journal of Network Security, Vol.5, No.1, PP.32–40, July 2007 Markov Chain Modelling of the Probabilistic Packet Marking Algorithm ∗

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2006-11-04 05:20:18
13Network architecture / Network congestion / Differentiated services / Router / Rate limiting / Denial-of-service attack / Traffic shaping / Random early detection / IP traceback / Network performance / Computing / Internet

Implementing Pushback: Router-Based Defense Against DDoS Attacks John Ioannidis AT&T Labs Research Abstract

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:30:53
14Internet standards / Network performance / IP traceback / Computer network security / Differentiated services / Transmission Control Protocol / IP address spoofing / Explicit Congestion Notification / Communications protocol / Network architecture / Computing / Internet

An Algebraic Approach to IP Traceback Drew Dean Xerox PARC Matt Franklin U.C. Davis

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:15:05
15Computing / Cryptographic hash function / Information / Hash tree / Transmission Control Protocol / Data / Hash function / IP traceback / Error detection and correction / Hashing / Cryptography

Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks∗ Sangwon Hyun, Peng Ning, An Liu North Carolina State University Abstract

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:10
16Forwarding plane / Computer architecture / Traffic flow / Transmission Control Protocol / IP traceback / Netflow / Wireless networking / Computing / Network architecture / OpenFlow

Where is the Debugger for my Software-Defined Network? Nikhil Handigol† , Brandon Heller† , Vimalkumar Jeyakumar† , David Mazières, and Nick McKeown Stanford University Stanford, CA, USA

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2012-06-28 17:22:23
17Telecommunications engineering / Network topology / Network simulation / Network emulation / Border Gateway Protocol / Cooperative Association for Internet Data Analysis / Topology / Virtual LAN / IP traceback / Computing / Electronics / Internet

Updates on the Internet emulation trials from the 9th CAIDA/WIDE workshop Hiroaki Hazeyama Assistant Prof. of Internet Engineering Lab. Nara Institute of Science and Technology Contact to : nerdbox-freaks_at_wide.ad.jp

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:54
18Internet / Computer security / Malware / IP traceback / National Institute of Information and Communications Technology / Threat / International Cybercrime / Computer network security / Security / Cyberwarfare

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2011-03-02 01:35:34
19Internet / Denial-of-service attacks / IP traceback / Routing protocols / Routing / IP address spoofing / Router / Smurf attack / Denial-of-service attack / Computing / Network architecture / Computer network security

Practical Network Support for IP Traceback Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson Department of Computer Science and Engineering University of Washington Seattle, WA, USA

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:10
20Data / IP traceback / Denial-of-service attack / IP address spoofing / IP fragmentation attacks / Firewall / Transmission Control Protocol / Ping / Communications protocol / Computer network security / Computing / Network architecture

Pi: A Path Identification Mechanism to Defend against DDoS Attacks Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.edu Abstract

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2007-07-15 10:32:33
UPDATE