Spoofing attack

Results: 127



#Item
21Network architecture / Hostname / DNS spoofing / Name server / Resolv.conf / DNS hijacking / Root name server / Hosts / Domain name / Domain name system / Internet / Computing

Lecture 17: DNS and the DNS Cache Poisoning Attack Lecture Notes on “Computer and Network Security” by Avi Kak () March 24, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-03-24 11:44:09
22Electronic Privacy Information Center / Caller ID spoofing / Automatic number identification / Voice over IP / Call blocking / Internet privacy / Telephone call / Vertical service code / Spoofing attack / Telephony / Caller ID / Electronic engineering

Testimony and Statement for the Record of Marc Rotenberg President and Executive Director, Electronic Privacy Information Center Hearing on H.R. 5126, the Truth in Caller ID Act of 2006

Add to Reading List

Source URL: epic.org

Language: English - Date: 2007-09-27 15:32:46
23Computing / DNS spoofing / Name server / Domain Name System Security Extensions / Root name server / Denial-of-service attack / Google Public DNS / Anycast / DNS hijacking / Domain name system / Internet / Network architecture

Internet Operation 2. Internet Operation DNS Open Resolver Issues There has been a spate of incidents in which recursive DNS servers without appropriate access

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2015-05-20 03:08:18
24Computational linguistics / Cyberwarfare / Human communication / Speech recognition / Biometrics / Speaker recognition / Speech synthesis / Spoofing attack / Attack / Computer network security / Automatic identification and data capture / Science

PDF Document

Add to Reading List

Source URL: www.cstr.ed.ac.uk

Language: English - Date: 2013-10-07 08:11:17
25Computer network security / GPS / Satellite navigation systems / Global Positioning System / Spoofing attack / LORAN / United States Department of Homeland Security / Threat / Technology / Navigation / Radio navigation

Microsoft PowerPoint - Final Slide Deck

Add to Reading List

Source URL: www.atis.org

Language: English - Date: 2014-10-03 16:27:59
26Military science / Geodesy / Satellite navigation systems / Aerospace engineering / Spoofing attack / Global Positioning System / GPS signals / GPS modernization / Pseudorange / GPS / Technology / Navigation

On the Requirements for Successful GPS Spoofing Attacks Nils Ole Tippenhauer Christina Pöpper Dept. of Computer Science Dept. of Computer Science

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2015-03-18 10:54:32
27Computer network security / System software / Hacking / Software testing / Malware / Denial-of-service attack / Code Red / Sadmind / DNS spoofing / Computer security / Cyberwarfare / Denial-of-service attacks

Overview of Attack Trends CERT® Coordination Center The CERT Coordination Center has been observing intruder activity sinceMuch has changed since then, from our technology to the makeup of the Internet user commu

Add to Reading List

Source URL: www.terrorism.com

Language: English - Date: 2012-02-04 12:13:39
28Internet / Network architecture / Smurf attack / Trinoo / IP address spoofing / UDP flood attack / Tribe Flood Network / Stacheldraht / Traffic flow / Denial-of-service attacks / Computing / Denial-of-service attack

D-WARD: DDoS Network Attack Recognition and Defense Ph.D. Dissertation Prospectus Jelena Mirkovi

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-01-24 19:27:00
29Cyberwarfare / Computer security / Denial-of-service attack / Internet Relay Chat / Transmission Control Protocol / IP address spoofing / SYN flood / Traffic flow / Packet loss / Computer network security / Denial-of-service attacks / Computing

1 D-WARD: A Source-End Defense Against Flooding Denial-of-Service Attacks Jelena Mirkovic, Member, IEEE, and Peter Reiher, Member, IEEE

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2005-07-01 17:41:22
30Multi-agent systems / Spamming / Internet standards / Denial-of-service attacks / Botnet / IP address spoofing / Internet background noise / Denial-of-service attack / IPv4 / Computing / Computer network security / Internet

Analysis of a “/0” Stealth Scan from a Botnet Alberto Dainotti, Alistair King, kc Claffy Ferdinando Papale, Antonio Pescapé CAIDA, University of California, San Diego

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-07 19:25:42
UPDATE