Spoofing attack

Results: 127



#Item
41Denial-of-service attack / SYN flood / Transmission Control Protocol / Blue / Traffic flow / Ingress filtering / UDP flood attack / IP address spoofing / Computer network security / Denial-of-service attacks / Computing

IEEE TRANSACTIONS ON COMPUTERS, VOL. 57, NO. 7, JULY 2008

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2008-11-14 18:01:53
42Hacking / Computing / Attack / Vulnerability / Zero-day attack / Denial-of-service attack / DNS spoofing / Domain Name System Security Extensions / Internet security / Computer network security / Cyberwarfare / Computer security

I n t e r ne t I n f r a s t r u c t u re Rev i e w Vol.21 Infrastructure Security The PlugX RAT Used in Targeted Attacks

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2015-05-20 03:08:08
43Cyberspace / Denial-of-service attack / IP address spoofing / SYN flood / UDP flood attack / Smurf attack / Firewall / Transmission Control Protocol / Internet security / Computer network security / Denial-of-service attacks / Computing

A Taxonomy of DDoS Attack and DDoS Defense Mechanisms ∗ Jelena Mirkovic

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2005-06-22 14:30:02
44Internet protocols / Network architecture / Computer network security / Internet standards / DNSSEC / Domain Name System Security Extensions / Name server / Denial-of-service attack / DNS spoofing / Domain name system / Internet / Computing

University of Amsterdam System & Network Engineering RP1 Defending against DNS reflection amplification attacks February 14, 2013

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2013-02-14 04:49:27
45Cyberwarfare / Computer security / Network performance / Denial-of-service attack / Internet Relay Chat / IP address spoofing / Robust random early detection / Transmission Control Protocol / Firewall / Computer network security / Denial-of-service attacks / Computing

Source-End DDoS Defense∗ Jelena Mirkovi´c Gregory Prier Peter Reiher University of California Los Angeles Computer Science Department 3564 Boelter Hall Los Angeles, CA 90095, USA

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2003-05-20 19:43:47
46Computer security / Denial-of-service attack / IP address spoofing / Transmission Control Protocol / Firewall / Wake-on-LAN / Network address translation / Peer-to-peer / NTP server misuse and abuse / Computer network security / Computing / Cyberwarfare

Building Accountability into the Future Internet Jelena Mirkovic Peter Reiher Information Sciences Institute

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2008-11-14 17:58:58
47Network architecture / Denial-of-service attack / Name server / DNS spoofing / Distributed denial of service attacks on root nameservers / Domain name system / Internet / Computing

DigitalOcean DigitalOcean answers 10,000 DNS queries every second. CloudFlare ensures that’s 100% clean traffic. The Company Few companies have seen growth like DigitalOcean. They offer the simplest and most cost effec

Add to Reading List

Source URL: www.cloudflare.com

Language: English - Date: 2015-04-17 11:59:29
48Geodesy / Satellite navigation systems / Avionics / Global Positioning System / GPS signals / Differential GPS / GPS navigation device / Spoofing attack / Selective availability anti-spoofing module / GPS / Technology / Navigation

GPS Software Attacks Tyler Nighswander Brent Ledvina Jonathan Diamond

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
49Computing / Network architecture / Internet protocols / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Name server / Prolexic Technologies / DNS spoofing / Domain name system / Internet / Computer network security

Press Release EfficientIP launches high-performance SOLIDserver DNS Blast to protect businesses from DNS DDoS attacks • First solution to support up to 17 million queries per second - 60 times more than current soluti

Add to Reading List

Source URL: www.efficientip.com

Language: English - Date: 2014-10-01 07:36:13
50Computer network security / Akamai Technologies / Content delivery network / Application firewall / Network performance / Denial-of-service attack / Load balancing / DNS spoofing / Anycast / Computing / Internet / Network architecture

White Paper Akamai Security Capabilities: Protecting Your Online Channels and Web Applications Table of Contents

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2012-01-25 15:24:03
UPDATE