Spoofing attack

Results: 127



#Item
31HTTP / Inter-process communication / Server Message Block / URL redirection / DNS spoofing / Shared resource / Man-in-the-middle attack / HTTP Secure / Computing / Network file systems / Computer network security

REDIRECT TO SMB REDIRECT TO SMB A CYLANCE SPEAR TEAM WHITE PAPER Lead Researcher: Brian Wallace // @botnet_hunter

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-04-13 03:55:39
32Cyberwarfare / Network architecture / Data security / IP address spoofing / Denial-of-service attack / SYN flood / Transmission Control Protocol / Ingress filtering / Firewall / Computer network security / Denial-of-service attacks / Computing

RAD: Reflector Attack Defense Using Message Authentication Codes Erik Kline† Matt Beaumont-Gay† Jelena Mirkovic? Peter Reiher† for Advanced Systems Research ? Information Sciences Institute UCLA Computer Science US

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2010-12-13 19:36:16
33Internet / Network architecture / Denial-of-service attack / Resolver / IP address spoofing / Latency / Name server / Throughput / Transmission Control Protocol / Network performance / Computer network security / Computing

Temporal Lensing and its Application in Pulsing Denial of Service Attacks Ryan Rasti Mukul Murthy Vern Paxson

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2014-05-26 14:37:07
34Internet / Denial-of-service attacks / IP traceback / Routing protocols / Routing / IP address spoofing / Router / Smurf attack / Denial-of-service attack / Computing / Network architecture / Computer network security

Practical Network Support for IP Traceback Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson Department of Computer Science and Engineering University of Washington Seattle, WA, USA

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:10
35Data / IP traceback / Denial-of-service attack / IP address spoofing / IP fragmentation attacks / Firewall / Transmission Control Protocol / Ping / Communications protocol / Computer network security / Computing / Network architecture

Pi: A Path Identification Mechanism to Defend against DDoS Attacks Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.edu Abstract

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2007-07-15 10:32:33
36Computer security / Computing / Denial-of-service attack / Internet Relay Chat / Data security / IP address spoofing / Transmission Control Protocol / Traffic flow / SYN flood / Computer network security / Denial-of-service attacks / Cyberwarfare

Inferring Internet Denial-of-Service Activity David Moore CAIDA San Diego Supercomputer Center University of California, San Diego

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:10
37Internet / Computer security / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / IP address spoofing / Proxy server / Transmission Control Protocol / IP traceback / Computer network security / Computing / Denial-of-service attacks

1 An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks Vern Paxson AT&T Center for Internet Research at ICSI

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2001-06-26 22:54:56
38Denial-of-service attack / IP traceback / IP address spoofing / Router / Firewall / Transmission Control Protocol / Traffic flow / Ping / Network congestion / Computer network security / Computing / Network architecture

SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks∗ Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.edu

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:10
39Computing / Domain Name System Security Extensions / DNS spoofing / Name server / Domain name registrar / Man-in-the-middle attack / Domain registration / OpenDNS / Domain name / Domain name system / Internet / Network architecture

Performance analysis of OFDM modulation on indoor broadband PLC channels

Add to Reading List

Source URL: jis.eurasipjournals.com

Language: English
40Network architecture / Denial-of-service attack / Traffic classification / Peer-to-peer / IP traceback / Packet switching / Distributed firewall / IP address spoofing / Flooding / Computer network security / Computing / Internet

A Framework for A Collaborative DDoS Defense George Oikonomou, Jelena Mirkovic University of Delaware oikonomo,

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2006-11-28 14:29:34
UPDATE