SYN cookies

Results: 33



#Item
11OSI protocols / Explicit Congestion Notification / Network architecture / Transmission Control Protocol / Active queue management / Computer network security / Traffic flow / SYN cookies / Network performance / Computing / Flow control

The Power of Explicit Congestion Notification Aleksandar Kuzmanovic Northwestern University

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2005-08-28 16:40:25
12Information / Network performance / Transmission Control Protocol / Data transmission / Communications protocol / SYN cookies / Berkeley sockets / Slow-start / TCP tuning / Computing / Data / TCP/IP

A Readable TCP in the Prolac Protocol Language Eddie Kohler, M. Frans Kaashoek, and David R. Montgomery M.I.T. Laboratory for Computer Science Cambridge, MA 02139, USA {eddietwo, kaashoek, dmontgom}@lcs.mit.edu http://ww

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 1999-06-09 12:23:11
13Cyberwarfare / Denial-of-service attacks / Cryptography / Proof-of-work system / Spam filtering / Hashcash / Adam Back / SYN cookies / Transmission Control Protocol / Computing / Computer network security / Computer security

Hashcash - A Denial of Service Counter-Measure Adam Back e-mail: 1st August 2002 Abstract Hashcash was originally proposed as a mechanism to throttle systematic abuse of un-metered internet resources

Add to Reading List

Source URL: nakamotoinstitute.org

Language: English - Date: 2014-03-23 11:39:34
14Internet Relay Chat / Network protocols / Network architecture / Denial-of-service attacks / Transmission Control Protocol / SYN cookies / Denial-of-service attack / Proof-of-work system / Session / Computing / Computer network security / Software

Technical Report UCAM-CL-TR-703 ISSNNumber 703

Add to Reading List

Source URL: www.tjd.phlegethon.org

Language: English - Date: 2007-11-15 10:46:56
15Network architecture / Computing / Transmission Control Protocol / Internet standards / Computer network security / T/TCP / SYN cookies / TCP hole punching / TCP/IP / Internet / Internet protocols

Network Working Group Request for Comments: 1644 Category: Experimental R. Braden ISI

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-03-27 15:14:37
16Software / Netfilter / Iptables / Firewall / Stateful firewall / Berkeley Packet Filter / Denial-of-service attack / Transmission Control Protocol / SYN cookies / System software / Computing / Computer network security

What’s New in the Linux Network Stack? Lukas M. Märdian Advisors: Paul Emmerich, Daniel Raumer Seminar Future Internet, Winter TermChair for Network Architectures and Services Department for Computer Science, T

Add to Reading List

Source URL: blog.slyon.de

Language: English - Date: 2014-10-15 10:57:34
17Network architecture / TCP/IP stack fingerprinting / TCP/IP / Transmission Control Protocol / Port knocking / P0f / Ip / Port / SYN cookies / Computer network security / Computing / Internet

Advanced Netfilter: Content Replacement (ala  Snort_inline) and Combining Port Knocking with  p0f Michael Rash DEFCON 12

Add to Reading List

Source URL: www.cipherdyne.org

Language: English - Date: 2013-11-03 15:37:36
18Computer network security / Internet privacy / Routing / Internet ethics / SYN cookies / TCP/IP / Transmission Control Protocol / HTTP cookie / Internet service provider / Computing / Internet / Network architecture

Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood Protection Martin Casado Aditya Akella Pei Cao Niels Provos Scott Shenker

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2008-02-23 01:41:57
19TCP/IP / Computer network security / Transmission Control Protocol / Internet / Transport layer / Internet standards / SYN cookies / TCP Cookie Transactions / Network architecture / Computing / Internet protocols

Network Working Group Request for Comments: 1379 R. Braden ISI November 1992

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-03-27 15:09:39
20Internet / Middlebox / Transmission Control Protocol / Denial-of-service attack / SYN flood / Traffic flow / SYN cookies / Network congestion / TCP half-open / Computer network security / Computing / Network architecture

dFence: Transparent Network-based Denial of Service Mitigation Ajay Mahimkar, Jasraj Dange, Vitaly Shmatikov, Harrick Vin, Yin Zhang Department of Computer Sciences, The University of Texas at Austin {mahimkar,jasraj,shm

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2007-02-20 20:43:44
UPDATE