TRACING ATTACKERS WITH TRUST-BASED DETERMINISTIC PACKET MARKING
A Hacker's Guide
(Sprache: Englisch)
Computer network attacks are on the increase and are more sophisticated in today's network environment than ever before. One step in tackling the increasing spate of attacks is the availability of a system that can trace attack packets back to their...
Leider schon ausverkauft
versandkostenfrei
Buch
45.90 €
Produktdetails
Produktinformationen zu „TRACING ATTACKERS WITH TRUST-BASED DETERMINISTIC PACKET MARKING “
Klappentext zu „TRACING ATTACKERS WITH TRUST-BASED DETERMINISTIC PACKET MARKING “
Computer network attacks are on the increase and are more sophisticated in today's network environment than ever before. One step in tackling the increasing spate of attacks is the availability of a system that can trace attack packets back to their original sources irrespective of invalid or manipulated source addresses. This project introduces a novel use of these maps to influence IP traceback in general, and packet marking schemes in particular. The Trust-based deterministic packet marking approach is capable of tracing back attacks, which are composed of just a few packets. Since a trust relationship will be maintained between routers for revealing the attacker's information, the overall overhead for tracebacking will be minimal. In addition, a service provider can implement this scheme without revealing its internal network topology.
Autoren-Porträt von FIROS A.
A., FIROSFiros A. is working as Assistant Professor at Rajiv Gandhi University, Rono Hills, Doimukh, India. He received his PhD (Computer Science and Engineering) from Rajiv Gandhi University, India in 2020. He received his M.E (Computer Science and Engineering) degree from Anna University in 2007 and M.B.A from Tamil Nadu Open University, India in 2013.
Bibliographische Angaben
- Autor: FIROS A.
- 2020, 72 Seiten, Maße: 22 cm, Kartoniert (TB), Englisch
- Verlag: Scholar's Press
- ISBN-10: 613894576X
- ISBN-13: 9786138945765
Sprache:
Englisch
Kommentar zu "TRACING ATTACKERS WITH TRUST-BASED DETERMINISTIC PACKET MARKING"
0 Gebrauchte Artikel zu „TRACING ATTACKERS WITH TRUST-BASED DETERMINISTIC PACKET MARKING“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "TRACING ATTACKERS WITH TRUST-BASED DETERMINISTIC PACKET MARKING".
Kommentar verfassen