Ingress filtering

Results: 20



#Item
1Computing / Network architecture / Internet / Routing / Internet Standards / Computer networking / Ethernet / Forwarding plane / Router / Forwarding information base / Control plane / Ingress filtering

IMPLEMENTING ADDRESS ASSURANCE IN THE INTEL IXP ROUTER Michael Burns, Gregory Prier, Jelena Mirkovic, Peter Reiher UCLA {mburns, greg, sunshine, reiher}@cs.ucla.edu

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2006-07-12 20:45:50
2Computer network security / Computer security / Netnod / European Union Agency for Network and Information Security / Ingress filtering

PDF Document

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2010-05-04 08:06:26
3Routing / Internet Standards / Computer networking / Ethernet / Forwarding plane / Router / Forwarding information base / Control plane / Ingress filtering / IPv4 / Border Gateway Protocol / Reverse path forwarding

IMPLEMENTING ADDRESS ASSURANCE IN THE INTEL IXP ROUTER Michael Burns, Gregory Prier, Jelena Mirkovic, Peter Reiher UCLA {mburns, greg, sunshine, reiher}@cs.ucla.edu

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2002-10-28 20:48:50
4OSI protocols / IPv6 / Internet Protocol / Mobile IP / Proxy Mobile IPv6 / Care-of address / Ingress filtering / Link layer / Triangular routing / Network architecture / Network protocols / Computing

Network Working Group Request for Comments: 4651 Category: Informational C. Vogt Universitaet Karlsruhe (TH)

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2007-02-07 21:15:21
5Cyberwarfare / IP address spoofing / Spoofing attack / Ingress filtering / Source routing / Email spoofing / IP address / Email / Website spoofing / Computer network security / Computing / Internet

SPOOFING Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006

Add to Reading List

Source URL: www.albany.edu

Language: English - Date: 2014-08-07 12:38:39
6Cyberwarfare / Network architecture / Data security / IP address spoofing / Denial-of-service attack / SYN flood / Transmission Control Protocol / Ingress filtering / Firewall / Computer network security / Denial-of-service attacks / Computing

RAD: Reflector Attack Defense Using Message Authentication Codes Erik Kline† Matt Beaumont-Gay† Jelena Mirkovic? Peter Reiher† for Advanced Systems Research ? Information Sciences Institute UCLA Computer Science US

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2010-12-13 19:36:16
7Denial-of-service attack / SYN flood / Transmission Control Protocol / Blue / Traffic flow / Ingress filtering / UDP flood attack / IP address spoofing / Computer network security / Denial-of-service attacks / Computing

IEEE TRANSACTIONS ON COMPUTERS, VOL. 57, NO. 7, JULY 2008

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2008-11-14 18:01:53
8Network architecture / Cyberwarfare / IP address spoofing / Data security / Ingress filtering / Denial-of-service attack / SYN flood / Traffic flow / Firewall / Computer network security / Computing / Denial-of-service attacks

Network Working Group Request for Comments: 2267 Category: Informational P. Ferguson Cisco Systems, Inc.

Add to Reading List

Source URL: www.jafsoft.com

Language: English - Date: 2006-04-23 14:42:51
9Computer network security / Routing protocols / Internet protocols / Networking hardware / Router / Server appliance / Ingress filtering / Border Gateway Protocol / Transmission Control Protocol / Network architecture / Computing / Internet

ID : An Incrementally Deployable Incoming Direction IDentification Protocol 3 Toby Ehrenkranz

Add to Reading List

Source URL: www.cs.uoregon.edu

Language: English - Date: 2007-10-01 19:32:32
10Cyberwarfare / Computer security / Smurf attack / Ingress filtering / Denial-of-service attack / Firewall / Traceroute / Transmission Control Protocol / Traffic flow / Computer network security / Computing / Denial-of-service attacks

Detecting Spoofed Packets Steven J. Templeton, Karl E. Levitt Department of Computer Science U.C. Davis {templets,levitt}@cs.ucdavis.edu Abstract

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:49:33
UPDATE