Back to Results
First PageMeta Content
Cyberwarfare / Computer security / Smurf attack / Ingress filtering / Denial-of-service attack / Firewall / Traceroute / Transmission Control Protocol / Traffic flow / Computer network security / Computing / Denial-of-service attacks


Detecting Spoofed Packets Steven J. Templeton, Karl E. Levitt Department of Computer Science U.C. Davis {templets,levitt}@cs.ucdavis.edu Abstract
Add to Reading List

Document Date: 2004-06-21 18:49:33


Open Document

File Size: 68,30 KB

Share Result on Facebook

City

Routing / /

Company

Link Local Networks / Special IP Addresses Private Networks / /

/

IndustryTerm

Internal routers / supposed attack site / network tool / particular site / spoofed packets affecting applications / Security monitoring systems / intrusion detection systems / research lab network / computer networks / source site / address/protocols / address/protocol / network devices / border router / security product / wireless networks / target network / internal network / /

OperatingSystem

DoS / Linux / /

Organization

Karl E. Levitt Department of Computer Science U.C. Davis / /

Person

Karl E. Levitt / Steven J. Templeton / /

Technology

Discussion Number Packets Protocol / Ethernet / learning IP address/protocol / Routing methods Because routers / DNS system / border router / packets Protocol / Flow Control / firewall / Linux / Number Packets Protocol / given IP address/protocol / network address translation / particular IP address/Protocol / streaming media / operating system / same protocol / UDP / Network Address Translation Some routers / DSL / distinct source IP address/protocols / IP protocol / four IP protocols / specific IP address/protocols / variance Number Addresses Number Packets Protocol / using the IP protocol / /

SocialTag