Spoofing attack

Results: 127



#Item
91Computing / Malware / Electronic voting / DNS spoofing / Denial-of-service attack / Computer worm / Computer virus / Exploit / Botnet / Computer network security / Cyberwarfare / Computer security

Security Considerations for Remote Electronic Voting over the Internet Avi Rubin AT&T Labs – Research Florham Park, NJ [removed]

Add to Reading List

Source URL: www.electioncenter.org

Language: English - Date: 2007-03-13 00:00:00
92Routing / Internet standards / Computer network security / Networking hardware / Router / Server appliance / Classless Inter-Domain Routing / Traffic flow / IP address spoofing / Network architecture / Computing / Internet

MULTOPS A data-structure for bandwidth attack detection Thomer M. Gil Vrije Universiteit, Amsterdam, Netherlands MIT, Cambridge, MA, USA

Add to Reading List

Source URL: thomer.com

Language: English - Date: 2011-05-03 01:42:43
93Denial-of-service attacks / Internet / Cyberwarfare / IP traceback / IP address spoofing / Denial-of-service attack / Firewall / Router / Packet switching / Computing / Network architecture / Computer network security

MULTOPS: a data-structure for bandwidth attack detection Thomer M. Gil and Massimiliano Poletto Vrije Universiteit, Amsterdam, The Netherlands and M.I.T., Cambridge, MA, USA {thomer,maxp}@lcs.mit.edu

Add to Reading List

Source URL: thomer.com

Language: English - Date: 2011-05-03 01:42:43
94Network architecture / Denial-of-service attack / UDP flood attack / Transmission Control Protocol / IP address spoofing / Robust random early detection / Router / Broadcast radiation / Network congestion / Denial-of-service attacks / Computer network security / Computing

MULTOPS: a data structure for denial-of-service attack detection by Thomer M. Gil [removed] Submitted to the Division of Mathematics and Computer Science

Add to Reading List

Source URL: thomer.com

Language: English - Date: 2011-05-03 01:42:43
95Internet / Firewall / Router / IP traceback / Denial-of-service attack / IP address spoofing / Ingress filtering / Computer network security / Computing / Network architecture

Pretty Good Packet Authentication Andreas Haeberlen†‡ † Rodrigo Rodrigues†

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2008-10-23 12:44:56
96Domain name system / Internet protocols / Public-key cryptography / Computer network security / DNS spoofing / Hacking / Domain Name System Security Extensions / Man-in-the-middle attack / DNS root zone / Internet / Network architecture / Computing

Backspace Unfinished Business Vinton G. Cerf T

Add to Reading List

Source URL: www.computer.org

Language: English - Date: 2013-12-18 23:27:54
97Network architecture / Cyberwarfare / Inter-process communication / Streaming / Traffic flow / Smurf attack / IP address spoofing / Firewall / Denial-of-service attack / Computing / Computer network security / Denial-of-service attacks

USENIX Association Proceedings of the 14th Systems Administration Conference (LISA[removed]New Orleans, Louisiana, USA

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-02-11 22:53:46
98Internet / IP traceback / Denial-of-service attacks / Routing protocols / Routing / IP address spoofing / Denial-of-service attack / Router / Communications protocol / Computing / Computer network security / Network architecture

226 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001 Network Support for IP Traceback Stefan Savage, David Wetherall, Member, IEEE, Anna Karlin, and Tom Anderson

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-02-17 21:43:15
99Denial-of-service attacks / Cyberwarfare / Multi-agent systems / Computer security / Botnet / Denial-of-service attack / Malware / IP address spoofing / Honeypot / Computer network security / Computing / Spamming

Aachen Department of Computer Science Technical Report Botnet Tracking: Exploring a Root-Cause Methodology to Prevent

Add to Reading List

Source URL: sunsite.informatik.rwth-aachen.de

Language: English - Date: 2006-04-03 08:20:52
100Computer security / Computing / Denial-of-service attack / Internet Relay Chat / Data security / IP address spoofing / Transmission Control Protocol / Traffic flow / SYN flood / Computer network security / Denial-of-service attacks / Cyberwarfare

Inferring Internet Denial-of-Service Activity David Moore CAIDA San Diego Supercomputer Center University of California, San Diego [removed]

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-02-11 22:53:17
UPDATE