Spoofing attack

Results: 127



#Item
11

Controlling IP Spoofing based DDoS Attacks Through Inter-Domain Packet Filters∗ Zhenhai Duan†, Xin Yuan, and Jaideep Chandrashekar Abstract The Distributed Denial of Services (DDoS) attack is a serious threat to the

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2012-09-05 15:29:28
    12

    Attack Class: Address Spoofing L. Todd Heberlein , Matt Bishop Department of Computer Science University of California Davis, CAAbstract

    Add to Reading List

    Source URL: seclab.cs.ucdavis.edu

    Language: English - Date: 2004-06-21 18:55:44
      13Computing / Domain Name System Security Extensions / DNS spoofing / Name server / Google Public DNS / Man-in-the-middle attack / PowerDNS / Anycast / CNAME record / Internet / Domain name system / Network architecture

      2014 IEEE Security and Privacy Workshops Towards Forensic Analysis of Attacks with DNSSEC Haya Shulman and Michael Waidner Fachbereich Informatik Technische Universit¨at Darmstadt

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2014-04-30 03:11:51
      14Computer security / Firewall / IP address spoofing / Denial-of-service attack / Internet security / Network address translation / IP address / Transmission Control Protocol / Port / Computer network security / Cyberwarfare / Computing

      Chapter 18: Network Attack and Defense C H A P TE R 18 Network Attack and Defense

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2006-10-12 06:34:00
      15Internet / Routing protocols / Denial-of-service attacks / IP traceback / Denial-of-service attack / Router / IP address spoofing / Traffic flow / Protocol Independent Multicast / Computing / Network architecture / Computer network security

      You Can Run, But You Can’t Hide: An Effective Methodology to Traceback DDoS Attackers K.T. Law Department of Computer Science & Engineering The Chinese University of

      Add to Reading List

      Source URL: www.cs.cuhk.hk

      Language: English - Date: 2004-06-10 15:32:10
      16Satellite navigation systems / Avionics / Geodesy / Spoofing attack / GPS signals / Global Positioning System / Satellite navigation / GPS navigation device / Phase-locked loop / Technology / GPS / Navigation

      Unmanned Aircraft Capture and Control via GPS Spoofing Andrew J. Kerns Department of Electrical and Computer Engineering The University of Texas at Austin

      Add to Reading List

      Source URL: radionavlab.ae.utexas.edu

      Language: English - Date: 2014-04-03 13:55:43
      17Cyberwarfare / IP address spoofing / Spoofing attack / Ingress filtering / Source routing / Email spoofing / IP address / Email / Website spoofing / Computer network security / Computing / Internet

      SPOOFING Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006

      Add to Reading List

      Source URL: www.albany.edu

      Language: English - Date: 2014-08-07 12:38:39
      18Network architecture / Denial-of-service attacks / Internet standards / IP traceback / Denial-of-service attack / Router / IP address spoofing / TCP global synchronization / Computer network security / Computing / Internet

       The AuthorPublished by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email: doi:comjnl/bxl026 An

      Add to Reading List

      Source URL: www.cs.cuhk.hk

      Language: English - Date: 2006-06-27 09:05:07
      19Network architecture / Computer network security / Address Resolution Protocol / ARP spoofing / Dynamic Host Configuration Protocol / DNS spoofing / DSniff / IP address / Man-in-the-middle attack / Internet standards / Internet / Computing

      TARP: Ticket-based Address Resolution Protocol Wesam Lootah, William Enck, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania Stat

      Add to Reading List

      Source URL: www.enck.org

      Language: English
      20Electronic Privacy Information Center / Caller ID spoofing / Automatic number identification / Voice over IP / Call blocking / Internet privacy / Telephone call / Vertical service code / Spoofing attack / Telephony / Caller ID / Electronic engineering

      Testimony and Statement for the Record of Marc Rotenberg President and Executive Director, Electronic Privacy Information Center Hearing on H.R. 5126, the Truth in Caller ID Act of 2006

      Add to Reading List

      Source URL: www.epic.org

      Language: English - Date: 2007-09-27 15:32:46
      UPDATE