Smurf attack

Results: 24



#Item
1CHAPTER  21 Network Attack and Defense Whoever thinks his problem can be solved using cryptography, doesn’t understand his problem and doesn’t understand cryptography.

CHAPTER 21 Network Attack and Defense Whoever thinks his problem can be solved using cryptography, doesn’t understand his problem and doesn’t understand cryptography.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:53:46
2If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Add to Reading List

Source URL: www.journalofcloudcomputing.com

Language: English
3D-WARD: DDoS Network Attack Recognition and Defense Ph.D. Dissertation Prospectus  Jelena Mirkovi

D-WARD: DDoS Network Attack Recognition and Defense Ph.D. Dissertation Prospectus Jelena Mirkovi

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-01-24 19:27:00
4Practical Network Support for IP Traceback Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson Department of Computer Science and Engineering University of Washington Seattle, WA, USA

Practical Network Support for IP Traceback Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson Department of Computer Science and Engineering University of Washington Seattle, WA, USA

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:10
5Past and Future Internet Disasters: DDoS attacks survey and analysis Thomas Dübendorfer <> Arno Wagner <> April 8th, 2003

Past and Future Internet Disasters: DDoS attacks survey and analysis Thomas Dübendorfer <> Arno Wagner <> April 8th, 2003

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2003-06-26 15:18:01
6A Taxonomy of DDoS Attack and DDoS Defense Mechanisms ∗  Jelena Mirkovic

A Taxonomy of DDoS Attack and DDoS Defense Mechanisms ∗ Jelena Mirkovic

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2005-06-22 14:30:02
7INMON CORP[removed]IRVING ST., SAN FRANCISCO, CA[removed]WWW.INMON.COM Using sFlow and InMon Traffic Server for Intrusion Detection and other Security Applications

INMON CORP[removed]IRVING ST., SAN FRANCISCO, CA[removed]WWW.INMON.COM Using sFlow and InMon Traffic Server for Intrusion Detection and other Security Applications

Add to Reading List

Source URL: www.inmon.com

Language: English - Date: 2010-02-18 17:43:56
8CITI Technical Report 98−6  Sifting the Network: Performing Packet Triage with NFR M. Undy [removed] C.J. Antonelli

CITI Technical Report 98−6 Sifting the Network: Performing Packet Triage with NFR M. Undy [removed] C.J. Antonelli

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 1999-04-28 09:28:10
9Detecting Spoofed Packets Steven J. Templeton, Karl E. Levitt Department of Computer Science U.C. Davis {templets,levitt}@cs.ucdavis.edu Abstract

Detecting Spoofed Packets Steven J. Templeton, Karl E. Levitt Department of Computer Science U.C. Davis {templets,levitt}@cs.ucdavis.edu Abstract

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:49:33
10Configuring DMS Central Control Software to Communicate with VMS Signs Using the PortServer® TS H MEI Serial Server

Configuring DMS Central Control Software to Communicate with VMS Signs Using the PortServer® TS H MEI Serial Server

Add to Reading List

Source URL: ftp1.digi.com

Language: English - Date: 2009-02-03 11:39:26