Back to Results
First PageMeta Content
Routing protocols / Routing / Internet protocols / Internet standards / Networking hardware / Router / Forwarding plane / Traffic flow / IP address spoofing / Network architecture / Internet / Computing


Packet Forwarding with Source Verification Craig A. Shue Minaxi Gupta Matthew P. Davy
Add to Reading List

Document Date: 2010-03-15 16:22:14


Open Document

File Size: 448,86 KB

Share Result on Facebook

/

IndustryTerm

hot standby protocol / hash chain / destination edge routers / network routers / Internet topology maps / traceback solutions / adjacent routers / tag exchange among neighboring implementing routers / non-core routers / malicious routers / incentives to deploying systems / downstream routers / forensic tools / Internet infrastructure / border gateway protocol / legacy networks / legitimate network / required per-packet processing / eBGP routers / start-up / infinite chain / compliant router / Internet routing fabric / faster processing / deployed solution / border routers / given network / legacy routers / source edge routers / subsequent routers / router hardware / much deployment information edge routers / malicious router / Internet prefixes / Subsequent deploying routers / required information among neighboring deploying routers / near-by upstream deploying routers / legacy systems / recursive router / subsequent implementing routers / last implementing router / legacy network / host probing router / autonomous systems / last deploying router / given router / basic shortest-path first algorithm / forensic tool / traffic leaving router / law enforcement / malicious hosts issuing router / untrustworthy routers / tag router / only spoof neighboring legacy networks / /

OperatingSystem

DoS / /

Organization

Indiana University / /

Person

Craig A. Shue Minaxi Gupta Matthew / /

Position

Chief Network Engineer / /

Technology

tag router / malicious hosts issuing router / IPv6 / receiving routers / initiating router / last implementing router / peer-to-peer / at least one deploying router / TCP intercepting router / host probing router / border gateway protocol / p2p / neighboring implementing routers / last deploying router / deploying router / BGP routers / UDP / traffic leaving router / neighboring routers / connection-oriented protocols / neighboring legacy routers / Deploying routers / 4 routers / Ethernet / eBGP routers / sending router / tagging routers / 2.4 routers / malicious router / Subsequent deploying routers / 10 routers / same routers / given router / 000 routers / load balancing / deductively tagging router / legacy routers / receiving router / challenged router / network routers / handshaking protocols / subsequent implementing routers / 500 routers / hot standby protocol / Tags When routers / boring deploying routers / IPv4 / near-by upstream deploying routers / compliant router / Simulation / border routers / implementing router / edge router / local router / /

SocialTag