Spoofing

Results: 545



#Item
151Data / IP traceback / Denial-of-service attack / IP address spoofing / IP fragmentation attacks / Firewall / Transmission Control Protocol / Ping / Communications protocol / Computer network security / Computing / Network architecture

Pi: A Path Identification Mechanism to Defend against DDoS Attacks Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.edu Abstract

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2007-07-15 10:32:33
152Internet protocols / Domain name system / Internet standards / Routing protocols / Public-key cryptography / Border Gateway Protocol / Domain Name System Security Extensions / IP hijacking / DNS spoofing / Network architecture / Internet / Computing

Internet Resilience in France 2013 Document produced by the ANSSI with the participation of the Afnic. Research and authoring by: François Contat, Mathieu Feuillet, Pierre Lorinquer, Samia M’timet,

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2015-03-11 14:09:01
153Computer security / Computing / Denial-of-service attack / Internet Relay Chat / Data security / IP address spoofing / Transmission Control Protocol / Traffic flow / SYN flood / Computer network security / Denial-of-service attacks / Cyberwarfare

Inferring Internet Denial-of-Service Activity David Moore CAIDA San Diego Supercomputer Center University of California, San Diego

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:10
154Internet / Computer security / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / IP address spoofing / Proxy server / Transmission Control Protocol / IP traceback / Computer network security / Computing / Denial-of-service attacks

1 An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks Vern Paxson AT&T Center for Internet Research at ICSI

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2001-06-26 22:54:56
155Computing / Internet protocols / Internet standards / Computer network security / Hacking / Domain Name System Security Extensions / DNS spoofing / Time to live / Name server / Internet / Domain name system / Cryptography

EphPub: Toward Robust Ephemeral Publishing Emiliano De Cristofaro Claude Castelluccia INRIA Rhone Alpes, France University of California, Irvine

Add to Reading List

Source URL: planete.inrialpes.fr

Language: English - Date: 2011-09-02 06:28:56
156Network architecture / Domain Name System Security Extensions / DNS spoofing / Name server / Ping / Google Public DNS / CNAME record / Tor / Dynamic DNS / Domain name system / Internet / Computing

Hold-On: Protecting Against On-Path DNS Poisoning Haixin Duan∗ , Nicholas Weaver†¶ , Zongxu Zhao∗ , Meng Hu∗ , Jinjin Liang∗ , Jian Jiang∗ , Kang Li‡ and Vern Paxson†§ ∗ Tsinghua University, Beijing,

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2012-03-31 21:23:27
157Computing / Anti-spam techniques / Email spoofing / Email / Computer-mediated communication / Internet

Explanation of Reply-To Setting A frequent question comes from subscribers who send email and then wonder why they do not always get a reply. Internet users who receive a lot of mail requiring a reply normally use the A

Add to Reading List

Source URL: stg.mpcug.net.au

Language: English - Date: 2015-04-04 05:30:23
158Internet standards / OSI protocols / Ethernet / Address Resolution Protocol / ARP spoofing / MAC flooding / MAC address / Ettercap / IP address spoofing / Network architecture / Computing / Computer network security

An Introduction to ARP Spoofing Sean Whalen http://chocobospore.org/arpspoof April, 2001 Revision 1.81

Add to Reading List

Source URL: www.fedonepal.org

Language: English - Date: 2014-10-14 18:51:17
159Network architecture / Name server / OpenDNS / Root name server / Domain Name System Security Extensions / DNS spoofing / Dnsmasq / Proxy server / DNS root zone / Domain name system / Internet / Computing

Implications of Netalyzr’s DNS Measurements Nicholas Weaver Christian Kreibich Boris Nechaev

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2011-04-23 13:54:49
160Denial-of-service attack / IP traceback / IP address spoofing / Router / Firewall / Transmission Control Protocol / Traffic flow / Ping / Network congestion / Computer network security / Computing / Network architecture

SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks∗ Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.edu

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:10
UPDATE