Zobrazeno 1 - 10
of 165
pro vyhledávání: '"Source address"'
Publikováno v:
Tongxin xuebao, Vol 42, Pp 41-53 (2021)
Aiming at the problem of spoofing flood defense in the control layer of SDN, a controller defense mechanism (CDM)was proposed, including a flood detection mechanism based on key features multi-classification and a flood mitigation mechanism based on
Externí odkaz:
https://doaj.org/article/5e158ce9ccad4ced832dc9c659cf85cd
Publikováno v:
Dianxin kexue, Vol 36, Pp 21-28 (2020)
At the beginning of the design of the Internet architecture,it assumed that all network members were trusted,and did not fully consider the security threat brought by the untrusted network members.For a long time,routers only forward packets based on
Externí odkaz:
https://doaj.org/article/7883094ab06846aba6231e8b993b3620
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Sensors, Vol 22, Iss 3, p 1061 (2022)
Software-defined networking (SDN) is a new networking paradigm that realizes the fast management and optimal configuration of network resources by decoupling control logic and forwarding functions. However, centralized network architecture brings new
Externí odkaz:
https://doaj.org/article/3e8514d0807a41eca409f590ec5eb2e7
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Yevheniya Nosyk, Maciej Korczyński, Qasim Lone, Marcin Skwarek, Baptiste Jonglez, Andrzej Duda
Publikováno v:
IEEE/ACM Transactions on Networking
IEEE/ACM Transactions on Networking, 2023, pp.1-15. ⟨10.1109/TNET.2023.3257413⟩
IEEE/ACM Transactions on Networking, 2023, pp.1-15. ⟨10.1109/TNET.2023.3257413⟩
International audience; Ingress filtering, commonly referred to as Source Address Validation (SAV), is a practice aimed at discarding packets with spoofed source IP addresses at the network periphery. Outbound SAV, i.e., dropping traffic with spoofed
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::02722701a9e5cc5a1f136534bef6fc4c
https://hal.science/hal-04048558/document
https://hal.science/hal-04048558/document
Publikováno v:
Dianxin kexue, Vol 31, Pp 1-196 (2015)
Distributed DNS reflective DDoS attack has become one of the main forms of denial of service attacks,and traditional security technology based on network traffic analysis and network traffic control technology can’t meet the needs of protection.D
Externí odkaz:
https://doaj.org/article/97e8c24a3c8e45e0ace768767a247aaa
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Lone, Q.B.
IP spoofing is the act of forging source IP addresses assigned to a host machine. Spoofing provides users the ability to hide their identity and impersonate another machine. Malicious users use spoofing to invoke a variety of attacks. Examples are Di
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c044dbf6dff32088ac4ae498324d7f7d
Autor:
Qasim Lone, Andrzej Duda, Maciej Korczynski, Marcin Skwarek, Baptiste Jonglez, Yevheniya Nosyk
Publikováno v:
ANRW 2020-Applied Networking Research Workshop
ANRW 2020-Applied Networking Research Workshop, Jul 2020, Madrid, Spain. pp.9-11, ⟨10.1145/3404868.3406668⟩
ANRW
ANRW 2020-Applied Networking Research Workshop, Jul 2020, Madrid, Spain. pp.9-11, ⟨10.1145/3404868.3406668⟩
ANRW
International audience; This paper reports on the first Internet-wide active measurement study to enumerate networks not filtering incoming packets based on their source address. Our method identifies closed and open DNS resolvers handling requests f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9f12609bdef8a5a698f9fbaa709b797c
https://hal.archives-ouvertes.fr/hal-02894078/document
https://hal.archives-ouvertes.fr/hal-02894078/document