First Page | Document Content | |
---|---|---|
Date: 2009-11-10 14:18:22Computing IP address spoofing Denial-of-service attack IP traceback Bogon filtering DNS spoofing Martian packet Ingress filtering Computer network security Cyberwarfare Computer security | Understanding the Efficacy of Deployed Internet Source Address Validation Filtering Robert Beverly, Arthur Berger (MIT), Young Hyun, k claffy (UCSD/CAIDA)Add to Reading ListSource URL: www.rbeverly.netDownload Document from Source WebsiteFile Size: 1,33 MBShare Document on Facebook |