Spoofing

Results: 545



#Item
171Hacking / Computing / Attack / Vulnerability / Zero-day attack / Denial-of-service attack / DNS spoofing / Domain Name System Security Extensions / Internet security / Computer network security / Cyberwarfare / Computer security

I n t e r ne t I n f r a s t r u c t u re Rev i e w Vol.21 Infrastructure Security The PlugX RAT Used in Targeted Attacks

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2015-05-20 03:08:08
172Cyberspace / Denial-of-service attack / IP address spoofing / SYN flood / UDP flood attack / Smurf attack / Firewall / Transmission Control Protocol / Internet security / Computer network security / Denial-of-service attacks / Computing

A Taxonomy of DDoS Attack and DDoS Defense Mechanisms ∗ Jelena Mirkovic

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2005-06-22 14:30:02
173Internet protocols / Network architecture / Computer network security / Internet standards / DNSSEC / Domain Name System Security Extensions / Name server / Denial-of-service attack / DNS spoofing / Domain name system / Internet / Computing

University of Amsterdam System & Network Engineering RP1 Defending against DNS reflection amplification attacks February 14, 2013

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2013-02-14 04:49:27
174OSI protocols / Network protocols / Internet protocols / Internet Protocol / Internet protocol suite / TCP/IP model / OSI model / Transmission Control Protocol / Link layer / Computing / Network architecture / Data

Lecture 16: TCP/IP Vulnerabilities: IP Spoofing and Denial-of-Service Attacks Lecture Notes on “Computer and Network Security” by Avi Kak () April 25, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-25 17:25:14
175Cyberwarfare / Computer security / Network performance / Denial-of-service attack / Internet Relay Chat / IP address spoofing / Robust random early detection / Transmission Control Protocol / Firewall / Computer network security / Denial-of-service attacks / Computing

Source-End DDoS Defense∗ Jelena Mirkovi´c Gregory Prier Peter Reiher University of California Los Angeles Computer Science Department 3564 Boelter Hall Los Angeles, CA 90095, USA

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2003-05-20 19:43:47
176Computing / DNS spoofing / Domain Name System Security Extensions / DNS zone / Name server / Anycast / Domain name / Comparison of DNS server software / Split-horizon DNS / Domain name system / Internet / Network architecture

DNS Threat Analysis Mark Santcroos∗, Olaf M. Kolkman†NLnet Labs www.nlnetlabs.nl NLnet Labs document 2006-SE-01 version 1.0 ∗

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
177Computing / Network architecture / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / DNS spoofing / Council of European National Top Level Domain Registries / NSD / Internet / Internet protocols / Domain name system

DNSSEC Raising the Barriers against DNS exploits Olaf M. Kolkman ()

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:03
178Computer security / Denial-of-service attack / IP address spoofing / Transmission Control Protocol / Firewall / Wake-on-LAN / Network address translation / Peer-to-peer / NTP server misuse and abuse / Computer network security / Computing / Cyberwarfare

Building Accountability into the Future Internet Jelena Mirkovic Peter Reiher Information Sciences Institute

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2008-11-14 17:58:58
179Text messaging / Online chat / SMS / SMS spoofing / Short message service center / Technology / Mobile technology / Wireless

DENBIGH ADMINISTRATION SMS Module www.denbigh.com.au

Add to Reading List

Source URL: www.denbigh.com.au

Language: English - Date: 2013-08-08 01:47:00
180Wireless networking / GTK+ / Wireshark / Nmap / Pcap / Aircrack-ng / Address Resolution Protocol / ARP spoofing / Wired Equivalent Privacy / Software / Computing / Computer network security

CIS 331 Федеральное бюро расследований работы Вторник, 17 Март Проект 3: Network Security

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-03-17 14:26:31
UPDATE