Inicio > > Redes y comunicaciones informáticas > TRACING ATTACKERS WITH TRUST-BASED DETERMINISTIC PACKET MARKING
TRACING ATTACKERS WITH TRUST-BASED DETERMINISTIC PACKET MARKING

TRACING ATTACKERS WITH TRUST-BASED DETERMINISTIC PACKET MARKING

FIROS A.

63,60 €
IVA incluido
Disponible
Editorial:
KS OmniScriptum Publishing
Año de edición:
2020
Materia
Redes y comunicaciones informáticas
ISBN:
9786138945765
63,60 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Computer network attacks are on the increase and are more sophisticated in today’s network environment than ever before. One step in tackling the increasing spate of attacks is the availability of a system that can trace attack packets back to their original sources irrespective of invalid or manipulated source addresses. This project introduces a novel use of these maps to influence IP traceback in general, and packet marking schemes in particular. The Trust-based deterministic packet marking approach is capable of tracing back attacks, which are composed of just a few packets. Since a trust relationship will be maintained between routers for revealing the attacker’s information, the overall overhead for tracebacking will be minimal. In addition, a service provider can implement this scheme without revealing its internal network topology.

Artículos relacionados

  • Next Generation Search Engines
    Recent technological progress in computer science, Web technologies, and the constantly evolving information available on the Internet has drastically changed the landscape of search and access to information. Current search engines employ advanced techniques involving machine learning, social networks, and semantic analysis. Next Generation Search Engines: Advanced Models for ...
  • Collaboration and the Semantic Web
    Collaborative working has been increasingly viewed as a good practice for organizations to achieve efficiency. Organizations that work well in collaboration may have access to new sources of funding, deliver new, improved, and more integrated services, make savings on shared costs, and exchange knowledge, information and expertise. Collaboration and the Semantic Web: Social Net...
  • Resource Allocation in Next-Generation Broadband Wireless Access Networks
    With the growing popularity of wireless networks in recent years, the need to increase network capacity and efficiency has become more prominent in society. This has led to the development and implementation of heterogeneous networks. Resource Allocation in Next-Generation Broadband Wireless Access Networks is a comprehensive reference source for the latest scholarly research o...
  • Advanced Topics in Information Technology Standards and Standardization Research, Volume 1
    Kai Jakobs
    ...
  • Data Warehouses and OLAP
    ...
  • Selected Readings on Database Technologies and Applications
    Terry Halpin
    Education and research in the field of database technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Database Technologies and Applications supplements course instruction and student research with quality chapters focused on key issues concerning the development, design, and analysis ...