Back to Results
First PageMeta Content
Internet / IP traceback / IP address spoofing / Denial-of-service attack / Traceroute / Ingress filtering / Hop / Internet protocol suite / Firewall / Computer network security / Computing / Network architecture


Hop-Count Filtering: An Effective Defense Against Spoofed Traffic Cheng Jin Haining Wang Kang G. Shin [removed], hxw,kgshin @eecs.umich.edu  Abstract
Add to Reading List

Document Date: 2003-02-13 11:39:15


Open Document

File Size: 210,02 KB

Share Result on Facebook

Company

Rocketfuel / Yahoo / Microsoft / /

Country

Italy / United States / /

/

Facility

By building / Stanford University / stable BGP / stable Border Gateway Protocol / /

IndustryTerm

Internet server / hop-count inspection algorithm / end-systems / campus network / stub network / victim server / Internet servers / Internet services / simplest solution / resource management / good and deployable solution / Internet experiments / proactive solution / inspection algorithm / zombie site / source address validity enforcement protocol / stub networks / Internet routing infrastructure / web servers / resource accounting / packet processing / Internet hosts / physical networks / on-line access / on-line filtering / Internet Web servers / web server / recent Internet / distributed attacking tools / busy site / Internet Map / /

OperatingSystem

Unix / Linux / DoS / BSD / Microsoft Windows / /

Organization

Stanford University / /

Person

Kang G. Shin / Filtering Recent / Trinity / /

Position

resource manager / /

ProvinceOrState

Manitoba / /

SportsLeague

Stanford University / /

Technology

source address validity enforcement protocol / Linux / Unix / IP router / operating systems / inspection algorithm / IP protocol / PDF / underlying routing algorithms / IP routers / remarkably stable Border Gateway Protocol / 2 3.2 Inspection Algorithm / hop-count inspection algorithm / web server / /

URL

net.yahoo.com / cpcug.org / /

SocialTag