Back to Results
First PageMeta Content
Cyberwarfare / Network architecture / Data security / IP address spoofing / Denial-of-service attack / SYN flood / Transmission Control Protocol / Ingress filtering / Firewall / Computer network security / Denial-of-service attacks / Computing


RAD: Reflector Attack Defense Using Message Authentication Codes Erik Kline† Matt Beaumont-Gay† Jelena Mirkovic? Peter Reiher† for Advanced Systems Research ? Information Sciences Institute UCLA Computer Science US
Add to Reading List

Document Date: 2010-12-13 19:36:16


Open Document

File Size: 200,93 KB

Share Result on Facebook

Company

RocketFuel / Advanced Network Architecture Group / IEEE Journal / Comcast / /

/

Event

Natural Disaster / /

Facility

Laboratory Abstract / /

IndustryTerm

gateway routers / stateful systems / software implementation / Internet Denial-of-Service Activity / individual networks / cryptographic hardware / replay tool / autonomous systems / reverse hash chain / gateway router / Internet traffic passes / hash algorithm / Internet Measurement Conference / route processors / Internet measurment / test software / computer communications / BASE edge routers / border router / border routers / /

OperatingSystem

DoS / Linux / /

Organization

Information Sciences Institute / National Science Foundation / Information Sciences Institute UCLA Computer Science USC School of Engineering / Electronic Frontier Foundation / /

Person

D. Moore / Erik Kline† Matt / Jelena Mirkovic / Matt Beaumont-Gay / Peter Reiher / D.J. Brown / S. Savage / C. Shannon / G.M. Voelker / /

Position

RT / General / /

Product

Click module / Click / /

Technology

cryptography / border router / route processors / hash algorithm / gateway router / public key / Source Address Validity Enforcement Protocol / DNS / Stack-Pi routers / Linux / HMAC-SHA-1 hash algorithm / ISP / participating routers / MTU / Transmission Control Protocol / secret key / gigabit / Communication Technology / UDP / HMAC algorithm / border routers / gateway routers / public key encryption / /

URL

www.yahoo.com.” / http /

SocialTag