- 1、本文档共13页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Revised
NeTS—FIND: Enabling Defense and
Deterrence through Private Attribution
†
Alex C. Snoeren, Yoshi Kohno , Stefan Savage, and Amin Vahdat
Department of Computer Science and Engineering
University of California, San Diego
La Jolla, CA 92093-0404
†Department of Computer Science and Engineering
University of Washington
Seattle, WA 98192-2350
October 2007–September 2008
1
1 Project description
The Internet’s any-to-any, best-effort communication model is widely heralded as one of the main reasons
for its success. The absence of strong architectural restrictions has allowed Internet protocols to support a
tremendous variety of applications on the same network substrate. Yet these same “architectural freedoms”
have also emerged as ripe vulnerabilities for adversaries trying to exploit the network to their ends. For
example, best-effort delivery and global addressing—both bullwarks of the modern Internet—are also the
features that enable distributed denial-of-service (DDoS) attacks to overwhelm remote sites on demand.
Indeed, today’s Internet infrastructure is extremely vulnerable to motivated and well-equipped attackers. A
testament to this reality is the plethora of tools readily available, from covertly exchanged exploit programs
to publicly released vulnerability assessment software, to degrade performance or even disable vital network
services. The consequences of these attacks are serious and, increasingly, financially disastrous.
Thus, it is clear that any future network architecture must learn from these lessons and bring network
security issues to the fore. However, while most research in network security focuses largely on def
您可能关注的文档
- 千金药业(600479)价值投资报告稳健成长 点滴积累.pdf
- 全国新课标Ⅰ卷高考密卷历史试题及答案.doc
- 《网络上的人际交往 课件》初中思想品德人教课标版八年级上册课件33298geo2k..ppt
- 弘扬水利精神 传承水利文化设施.ppt
- 9[1].计算机多媒体技术--计算机应用基础统考试题库及答案.doc
- Research and development and intra-industry spillovers_ An empirical application of dynamic duality英文精品课件.pdf
- Remote Sensing amp; GIS英文精品课件.pdf
- 我国上市公司会计舞弊问题研究.pdf
- WAV BMP文件读取 程序报告.doc
- 山东春蕾纺织公司核心管理.pdf
1亿VIP精品文档
相关文档
最近下载
- 光纤位移传感器实验.doc VIP
- TED演讲训练稿件 Be humble——and other lessons from the philosophy of water.docx
- (人教版)数学四年级下册期中复习计算题强化训练习题卡,含30份题组.doc
- 5、城轨工程项目全国劳务分包指导价(车站.盾构.铺轨).pdf
- 在科学教育活动中引导幼儿主动探究有效策略.doc
- 2022年广西柳州市中考物理试卷(含答案与解析).docx VIP
- 05s518-雨水口标准图集.pdf
- 高考英语时事新闻篇-日本核污水排海.docx VIP
- [精品]小升初学生个人简历模板 (31).pdf
- 北京市房屋租赁合同范本(链家官方版).pdf
文档评论(0)