IP traceback

Results: 42



#Item
21Internet / Computer security / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / IP address spoofing / Proxy server / Transmission Control Protocol / IP traceback / Computer network security / Computing / Denial-of-service attacks

1 An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks Vern Paxson AT&T Center for Internet Research at ICSI

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2001-06-26 22:54:56
22Denial-of-service attack / IP traceback / IP address spoofing / Router / Firewall / Transmission Control Protocol / Traffic flow / Ping / Network congestion / Computer network security / Computing / Network architecture

SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks∗ Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.edu

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:10
23Network architecture / Denial-of-service attack / Traffic classification / Peer-to-peer / IP traceback / Packet switching / Distributed firewall / IP address spoofing / Flooding / Computer network security / Computing / Internet

A Framework for A Collaborative DDoS Defense George Oikonomou, Jelena Mirkovic University of Delaware oikonomo,

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2006-11-28 14:29:34
24Information / Ethernet / IP traceback / Internet / Email / Wi-Fi / Transmission Control Protocol / Communications protocol / Network switch / Computing / Data / Computer network security

Message Traceback Systems Dancing with the Devil Thesis by Marios S. Andreou

Add to Reading List

Source URL: mariosandreou.com

Language: English - Date: 2013-03-20 12:55:36
25IP traceback / Internet / Information / Data transmission / Denial-of-service attacks / Denial-of-service attack / Router / Communications protocol / Transmission Control Protocol / Computing / Computer network security / Data

2-7 The Mathematics Models and an Actual Proof Experiment for IP Traceback System SUZUKI Ayako, OHMORI Keisuke, MATSUSHIMA Ryu, KAWABATA Mariko, OHMURO Manabu, KAI Toshifumi, and NISHIYAMA Shigeru IP traceback is a techn

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:56:56
26Internet / Data / Denial-of-service attacks / Information / Data transmission / Denial-of-service attack / Traffic flow / Communications protocol / Transmission Control Protocol / Computing / Computer network security / IP traceback

2-5 Efficient Traceback Method for Detecting Illegal Access KAI Toshifumi, NAKATANI Hiroshige, SHIMIZU Hiroshi, SUZUKI Ayako, and TSUKAMOTO Katsuji The amount of damage by illegal access is increasing with the spread of

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:56:19
27Network architecture / Spamming / Phishing / IP traceback / IP address spoofing / Traceability / IP address / AdaBoost / Border Gateway Protocol / Internet / Computing / Social engineering

3-3 S tudies on Countermeasures for Thwarting Spoofing Attacks — Cases of IP Address Spoofing and Web Spoofing — MIYAMOTO Daisuke, HAZEYAMA Hiroaki, and KADOBAYASHI Youki This article intends to give case studies f

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:06:17
28ElGamal encryption / RSA / Oblivious transfer / XTR / Ciphertext / Cryptography / Public-key cryptography / Cryptographic protocols

3-6 T  oward Realizing Privacy-Preserving IP-Traceback NOJIMA Ryo The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems hav

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2012-03-11 23:15:00
29Teletraffic / Internet / Computer networking / Computer network security / Denial-of-service attack / Internet Relay Chat / IP traceback / Network congestion / Packet switching / Network performance / Computing / Network architecture

An Autonomic Approach to Denial of Service Defence∗ Erol Gelenbe, Michael Gellman, and George Loukas Department of Electrical & Electronic Engineering Imperial College, London SW7 2BT {e.gelenbe,m.gellman,georgios.louk

Add to Reading List

Source URL: san.ee.ic.ac.uk

Language: English - Date: 2005-02-14 12:24:51
30Denial-of-service attacks / Network architecture / Teletraffic / Computer networking / Electronics / IP traceback / Denial-of-service attack / Network congestion / Packet switching / Computing / Network performance / Computer network security

This article was originally published in a journal published by Elsevier, and the attached copy is provided by Elsevier for the author’s benefit and for the benefit of the author’s institution, for non-commercial res

Add to Reading List

Source URL: san.ee.ic.ac.uk

Language: English - Date: 2007-01-22 10:42:03
UPDATE