Ingress filtering

Results: 20



#Item
11Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2005-03-11 09:41:56
12BCP 1 ISSUE 2: Blocking and filtering of Internet traffic  A Best Common Practice (BCP) document is a non mandatory recommendation representing what ISPA believes is best practice at the time of writing. Prescriptive lan

BCP 1 ISSUE 2: Blocking and filtering of Internet traffic A Best Common Practice (BCP) document is a non mandatory recommendation representing what ISPA believes is best practice at the time of writing. Prescriptive lan

Add to Reading List

Source URL: www.ispa.org.uk

Language: English - Date: 2014-04-25 10:03:57
13Pretty Good Packet Authentication Andreas Haeberlen†‡ † Rodrigo Rodrigues†

Pretty Good Packet Authentication Andreas Haeberlen†‡ † Rodrigo Rodrigues†

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2009-10-16 16:58:54
14Tracefilter: A Tool for Locating Network Source Address Validation Filters ∗ USENIX Security ’07 Poster Robert Beverly

Tracefilter: A Tool for Locating Network Source Address Validation Filters ∗ USENIX Security ’07 Poster Robert Beverly

Add to Reading List

Source URL: rbeverly.net

Language: English - Date: 2007-09-18 11:32:20
15Understanding the Efficacy of Deployed Internet Source Address Validation Filtering Robert Beverly, Arthur Berger (MIT), Young Hyun, k claffy (UCSD/CAIDA)

Understanding the Efficacy of Deployed Internet Source Address Validation Filtering Robert Beverly, Arthur Berger (MIT), Young Hyun, k claffy (UCSD/CAIDA)

Add to Reading List

Source URL: rbeverly.net

Language: English - Date: 2009-11-10 14:18:22
16IP Spoofer Project Observations on four-years of data Rob Beverly, Arthur Berger, Young Hyun {rbeverly,awberger}@csail.mit, youngh@caida ISMA AIMS 2009

IP Spoofer Project Observations on four-years of data Rob Beverly, Arthur Berger, Young Hyun {rbeverly,awberger}@csail.mit, youngh@caida ISMA AIMS 2009

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2014-09-29 22:51:25
17Understanding the Efficacy of Deployed Internet Source Address Validation Filtering Robert Beverly Arthur Berger

Understanding the Efficacy of Deployed Internet Source Address Validation Filtering Robert Beverly Arthur Berger

Add to Reading List

Source URL: rbeverly.net

Language: English - Date: 2009-09-16 16:30:12
18Pretty Good Packet Authentication Andreas Haeberlen†‡ † Rodrigo Rodrigues†

Pretty Good Packet Authentication Andreas Haeberlen†‡ † Rodrigo Rodrigues†

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2008-10-23 12:44:56
19Understanding the Efficacy of Deployed Internet Source Address Validation Filtering Robert Beverly, Arthur Berger (MIT), Young Hyun, k claffy (UCSD/CAIDA)

Understanding the Efficacy of Deployed Internet Source Address Validation Filtering Robert Beverly, Arthur Berger (MIT), Young Hyun, k claffy (UCSD/CAIDA)

Add to Reading List

Source URL: www.rbeverly.net

Language: English - Date: 2009-11-10 14:18:22
20Hop-Count Filtering: An Effective Defense Against Spoofed Traffic Cheng Jin Haining Wang Kang G. Shin [removed], hxw,kgshin @eecs.umich.edu   Abstract

Hop-Count Filtering: An Effective Defense Against Spoofed Traffic Cheng Jin Haining Wang Kang G. Shin [removed], hxw,kgshin @eecs.umich.edu  Abstract

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2003-02-13 11:39:15