Smurf attack

Results: 24



#Item
1Internet / Denial-of-service attacks / Cyberwarfare / Spamming / Multi-agent systems / Denial-of-service attack / Botnet / Smurf attack / Anycast / Computer network security / Computing / Network architecture

CHAPTER 21 Network Attack and Defense Whoever thinks his problem can be solved using cryptography, doesn’t understand his problem and doesn’t understand cryptography.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:53:46
2Cyberwarfare / Denial-of-service attacks / Computer security / Cloud computing / Denial-of-service attack / Nmap / Attack / Smurf attack / Grid computing / Computer network security / Software / Computing

If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Add to Reading List

Source URL: www.journalofcloudcomputing.com

Language: English
3Internet / Network architecture / Smurf attack / Trinoo / IP address spoofing / UDP flood attack / Tribe Flood Network / Stacheldraht / Traffic flow / Denial-of-service attacks / Computing / Denial-of-service attack

D-WARD: DDoS Network Attack Recognition and Defense Ph.D. Dissertation Prospectus Jelena Mirkovi

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-01-24 19:27:00
4Internet / Denial-of-service attacks / IP traceback / Routing protocols / Routing / IP address spoofing / Router / Smurf attack / Denial-of-service attack / Computing / Network architecture / Computer network security

Practical Network Support for IP Traceback Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson Department of Computer Science and Engineering University of Washington Seattle, WA, USA

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:10
5Denial-of-service attack / System software / Internet security / Cyberspace / Smurf attack / SYN flood / Transmission Control Protocol / Ping / Denial-of-service attacks / Computer network security / Computing

Past and Future Internet Disasters: DDoS attacks survey and analysis Thomas Dübendorfer <> Arno Wagner <> April 8th, 2003

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2003-06-26 15:18:01
6Cyberspace / Denial-of-service attack / IP address spoofing / SYN flood / UDP flood attack / Smurf attack / Firewall / Transmission Control Protocol / Internet security / Computer network security / Denial-of-service attacks / Computing

A Taxonomy of DDoS Attack and DDoS Defense Mechanisms ∗ Jelena Mirkovic

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2005-06-22 14:30:02
7Information technology management / Denial-of-service attacks / Cyberwarfare / Wireless networking / SFlow / Netflow / Denial-of-service attack / Network security / Smurf attack / Network management / Computing / Computer network security

INMON CORP[removed]IRVING ST., SAN FRANCISCO, CA[removed]WWW.INMON.COM Using sFlow and InMon Traffic Server for Intrusion Detection and other Security Applications

Add to Reading List

Source URL: www.inmon.com

Language: English - Date: 2010-02-18 17:43:56
8Computer network security / System software / Cyberwarfare / Firewall / Smurf attack / Denial-of-service attack / Transmission Control Protocol / Traffic flow / Ping / Denial-of-service attacks / Software / Computing

CITI Technical Report 98−6 Sifting the Network: Performing Packet Triage with NFR M. Undy [removed] C.J. Antonelli

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 1999-04-28 09:28:10
9Cyberwarfare / Computer security / Smurf attack / Ingress filtering / Denial-of-service attack / Firewall / Traceroute / Transmission Control Protocol / Traffic flow / Computer network security / Computing / Denial-of-service attacks

Detecting Spoofed Packets Steven J. Templeton, Karl E. Levitt Department of Computer Science U.C. Davis {templets,levitt}@cs.ucdavis.edu Abstract

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:49:33
10Computer security / Computing / Smurf attack / Denial-of-service attack / SYN flood / IP address spoofing / Ping / LAND / Stateful firewall / Denial-of-service attacks / Computer network security / Cyberwarfare

Configuring DMS Central Control Software to Communicate with VMS Signs Using the PortServer® TS H MEI Serial Server

Add to Reading List

Source URL: ftp1.digi.com

Language: English - Date: 2009-02-03 11:39:26
UPDATE