IP traceback

Results: 42



#Item
31Network architecture / Denial-of-service attack / Ingress filtering / IP address spoofing / IP traceback / Router / Anycast / Firewall / Internet security / Computer network security / Computing / Cyberwarfare

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2005-03-11 09:41:56
32Internet / Firewall / Router / IP traceback / Denial-of-service attack / IP address spoofing / Ingress filtering / Computer network security / Computing / Network architecture

Pretty Good Packet Authentication Andreas Haeberlen†‡ † Rodrigo Rodrigues†

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2009-10-16 16:58:54
33Electronics / Bloom filter / Hashing / Network topology / Link-state routing protocol / IP traceback / Network coding / Routing / Topology / Computing / Network architecture / Routing algorithms

Evaluation of Path Recording Techniques in Secure MANET Danai Chasaki and Tilman Wolf Department of Electrical and Computer Engineering University of Massachusetts, Amherst, MA, USA Email: {dchasaki,wolf}@ecs.umass.edu

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2013-12-04 11:29:34
34Computing / IP address spoofing / Denial-of-service attack / IP traceback / Bogon filtering / DNS spoofing / Martian packet / Ingress filtering / Computer network security / Cyberwarfare / Computer security

Understanding the Efficacy of Deployed Internet Source Address Validation Filtering Robert Beverly, Arthur Berger (MIT), Young Hyun, k claffy (UCSD/CAIDA)

Add to Reading List

Source URL: rbeverly.net

Language: English - Date: 2009-11-10 14:18:22
35IP traceback / Denial-of-service attack / Botnet / Ingress filtering / Spoofing attack / Computer network security / Computing / IP address spoofing

IP Spoofer Project Observations on four-years of data Rob Beverly, Arthur Berger, Young Hyun {rbeverly,awberger}@csail.mit, youngh@caida ISMA AIMS 2009

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2014-09-29 22:51:25
36Denial-of-service attacks / Internet / Cyberwarfare / IP traceback / IP address spoofing / Denial-of-service attack / Firewall / Router / Packet switching / Computing / Network architecture / Computer network security

MULTOPS: a data-structure for bandwidth attack detection Thomer M. Gil and Massimiliano Poletto Vrije Universiteit, Amsterdam, The Netherlands and M.I.T., Cambridge, MA, USA {thomer,maxp}@lcs.mit.edu

Add to Reading List

Source URL: thomer.com

Language: English - Date: 2011-05-03 01:42:43
37Internet / Firewall / Router / IP traceback / Denial-of-service attack / IP address spoofing / Ingress filtering / Computer network security / Computing / Network architecture

Pretty Good Packet Authentication Andreas Haeberlen†‡ † Rodrigo Rodrigues†

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2008-10-23 12:44:56
38Internet / IP traceback / Denial-of-service attacks / Routing protocols / Routing / IP address spoofing / Denial-of-service attack / Router / Communications protocol / Computing / Computer network security / Network architecture

226 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001 Network Support for IP Traceback Stefan Savage, David Wetherall, Member, IEEE, Anna Karlin, and Tom Anderson

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-02-17 21:43:15
39Computing / IP address spoofing / Denial-of-service attack / IP traceback / Bogon filtering / DNS spoofing / Martian packet / Ingress filtering / Computer network security / Cyberwarfare / Computer security

Understanding the Efficacy of Deployed Internet Source Address Validation Filtering Robert Beverly, Arthur Berger (MIT), Young Hyun, k claffy (UCSD/CAIDA)

Add to Reading List

Source URL: www.rbeverly.net

Language: English - Date: 2009-11-10 14:18:22
40Internet / IP traceback / IP address spoofing / Denial-of-service attack / Traceroute / Ingress filtering / Hop / Internet protocol suite / Firewall / Computer network security / Computing / Network architecture

Hop-Count Filtering: An Effective Defense Against Spoofed Traffic Cheng Jin Haining Wang Kang G. Shin [removed], hxw,kgshin @eecs.umich.edu  Abstract

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2003-02-13 11:39:15
UPDATE