scispace - formally typeset
Book ChapterDOI

On the Security and Vulnerability of PING

Reads0
Chats0
TLDR
It is argued that despite the security of PING against weak adversaries, the natural vulnerability of this protocol can be exploited by a weak adversary to launch a denial of service attack against any computer that hosts the protocol.
Abstract
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is secure against weak adversaries (and insecure against strong ones) We then argue that despite the security of PING against weak adversaries, the natural vulnerability of this protocol (or of any other protocol for that matter) can be exploited by a weak adversary to launch a denial of service attack against any computer that hosts the protocol Finally, we discuss three mechanisms, namely ingress filtering, hop integrity, and soft firewalls that can be used to prevent denial of service attacks in the Internet

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Fault-local stabilization : the shortest path tree

TL;DR: A fault-local solution to the shortest path tree problem in a rooted network where a transient fault corrupts f nodes after the tree has been constructed and allows to recover in less than O (f) time units.
References
More filters

Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing

P. Ferguson, +1 more
TL;DR: A simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point is discussed.
Book

Self-stabilization

TL;DR: A formal impossibility proof shows that, in order to ensure the correct behavior of the system, less than one-third of the processors may be of the Byzantine type; that is, to design the system as if there were no (yesterday) past history—a system that can be started in any possible state of its state space.
Book

Firewalls and Internet Security: Repelling the Wily Hacker

TL;DR: The first edition made a number of predictions, explicitly or implicitly, about the growth of the Web and the patterns of Internet connectivity vastly increased, and warned of issues posed by home LANs, and about the problems caused by roaming laptops.
Book

Firewalls and Internet Security

TL;DR: The 2-amino-3-bromoanthraquinone which is isolated may be used for the manufacture of dyes and is at least as pure as that obtained from purified 2- aminoanthraquin one by the process of the prior art.