Back to Results
First PageMeta Content
Internet / Data / Denial-of-service attacks / Information / Data transmission / Denial-of-service attack / Traffic flow / Communications protocol / Transmission Control Protocol / Computing / Computer network security / IP traceback


2-5 Efficient Traceback Method for Detecting Illegal Access KAI Toshifumi, NAKATANI Hiroshige, SHIMIZU Hiroshi, SUZUKI Ayako, and TSUKAMOTO Katsuji The amount of damage by illegal access is increasing with the spread of
Add to Reading List

Document Date: 2013-11-21 18:56:19


Open Document

File Size: 1,84 MB

Share Result on Facebook

City

Hash / San Diego / Stockholm / /

Company

Matsusita Electric Works Ltd. Networks / Large-Scale Networks / NTT Advanced Technology Corp. Networks / inter-AS / Advanced Technologies Development Laboratory / SHIMIZU / SUZUKI / KAI Toshifumi Advanced Technologies Development Laboratory / /

Country

Sweden / /

Currency

pence / /

Facility

National Institute of Information / Ltd. Networks Security SUZUKI Ayako Core Network Business Headquarters / /

IndustryTerm

actual networks / external devices / social infrastructure / immediate router / government networks / higher-level protocols / traceback technologies / autonomous systems / uTrace module software / communications delays / /

OperatingSystem

DoS / Linux / /

Organization

National Institute of Information / New Business Planning Office / Kogakuin University / /

Person

Agr / /

Position

Senior Engineer / 64th General / Professor / General Manager / network administrator / IEICE General / /

Product

uTrace system / uTrace / /

Technology

at least one router / 46 router / higher-level protocols / specified router / actual PC routers / Linux / network processor / three typical IP traceback technologies / ISP / immediate router / UDP / /

SocialTag