Back to Results
First PageMeta Content
Denial-of-service attack / SYN flood / Transmission Control Protocol / Blue / Traffic flow / Ingress filtering / UDP flood attack / IP address spoofing / Computer network security / Denial-of-service attacks / Computing


IEEE TRANSACTIONS ON COMPUTERS, VOL. 57, NO. 7, JULY 2008
Add to Reading List

Document Date: 2008-11-14 18:01:53


Open Document

File Size: 3,64 MB

Share Result on Facebook

City

MIRKOVIC ET / Cambridge / Albuquerque / El Segundo / /

Company

BBN Technologies / Sparta Inc. / Cisco / Sandia National Laboratories / /

Currency

USD / /

/

Event

Natural Disaster / Reorganization / /

Facility

Colorado State University / Boelter Hall / University of California Los Angeles / University of Southern California Information Sciences Institute / Purdue University / Campus Delivery / USC Information Sciences Institute / /

IndustryTerm

lightweight networks / implicated source networks / rate-limiting algorithm / traffic generation network / experimental network / Web applications / tested systems / victim network / defensive software / victim edge network / real Internet / legacy networks / collection tools / software components / attack tools / security systems / final network / reconnaissance network / semiautonomous software agents / suspect source networks / Internet-scale / defense systems / out-of-the-box tools / network border routers / large network / attack-specific multicast / Attacks targeting routers / larger network / defensive technology / gateway router / defensive technologies / standalone systems / out-of-band network / 3600family routers / related security systems / disjoint edge networks / defense software / generated using semiautonomous software agents / /

OperatingSystem

DoS / /

Organization

UCLA / USC Information Sciences Institute / University of Southern California Information Sciences Institute / ISI / Purdue University / White Team / Colorado State University / Department of Computer Science / University of California Los Angeles / IEEE Computer Society / /

Person

Marla Shepard / Jelena Mirkovic / Christos Papadopoulos / Tom Obenauf / Michael Berg / Alefiya Hussain / Wilson Farrell / Dino Dai Zovi / Robert Jung Abstract / Pam Helinek / Lyle Sudin / Bob Lindell / Conor Sibley / Robert Jung / Peter Reiher / John Mehringer / Ken Theriault / William Nelson / /

Position

Governor / representative / /

ProvinceOrState

California / New Mexico / Massachusetts / /

PublishedMedium

IEEE TRANSACTIONS ON COMPUTERS / /

Region

Southern California / /

Technology

3600family routers / SNMP / network border routers / gateway router / defensive technologies / VPN / UDP / Ethernet / rate-limiting algorithm / Attacks targeting routers / three protocols / HTTP / Digital Object Identifier / flash / defensive technology / /

SocialTag