|
Volumn , Issue , 2010, Pages
|
An effective method for defense against IP spoofing attack
|
Author keywords
IP spoofing attack; Network security; Traceroute; Trusted node
|
Indexed keywords
ADJACENT NODES;
DISTRIBUTED DENIAL OF SERVICE ATTACK;
ECONOMIC LOSS;
IP SPOOFING;
NETWORK SERVICES;
SECURITY THREATS;
TRACEROUTE;
TRUSTED NODE;
INTERNET PROTOCOLS;
LOSS PREVENTION;
MOBILE COMPUTING;
WIRELESS NETWORKS;
WIRELESS TELECOMMUNICATION SYSTEMS;
NETWORK SECURITY;
|
EID: 78549248854
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/WICOM.2010.5601287 Document Type: Conference Paper |
Times cited : (10)
|
References (9)
|