Citations
537 |
Secure Computer Systems: Mathematical Foundations,
- Bell, LaPadula
- 1973
(Show Context)
Citation Context ...read(&test,sizeof(unsigned char),6,fp);stest[0]= 0; /* set MAC to intel */stest[1]= 170; /* set MAC to intel */stest[2]= 0; /* set MAC to intel */s/* ICMP6 TARGET, IPDST */s/* dst6 = thc_resolve6(argv=-=[4]-=-); */s/* dst6 = thc_resolve6("ff02::2");*/s/* dst6 = thc_resolve6("fe80::2873:2031:1142:f1f8"); */s/* real proper CGA address */s83s/* cga6 = thc_resolve6("fe80::30b4:f52d:584f:5cdf"); */s/* testdst6 ... |
69 |
RFC-826: An Ethernet Address Resolution Protocol”, Network Working Group.
- Plummer
- 1982
(Show Context)
Citation Context ...t given the host’s IP address, and it is required only whensthe target host is within the same subnet as the sender.sIt operates as follows.sThe sendersbroadcasts an Address Resolution Protocol (ARP) =-=[6]-=- broadcast to the entire subnet,sasking, "Who is 1.2.3.4?sTell 5.6.7.8."sThe ARP server of the target system which hassthe IP address of 1.2.3.4 forms an ARP response with, "1.2.3.4 iss6 AA:BB:CC:DD:E... |
17 | IETF RFC 3281: An Internet Attribute Certificate Profile for Authorization - Farrell, Housley - 2002 |
9 |
Ipv6 and ipv4 threat comparison and best-practice evaluation (v1.0),” www.seanconvery.comv6-v4-threats.pdf
- Convery, Miller
- 2004
(Show Context)
Citation Context ...Pv6 protocol suite, as opposed to IPv4 where IPsec is a separate system.sWhile thissis true, IPsec itself has many problems, mostly stemming from the nature of thesasymmetric key cryptography it uses =-=[12]-=-, [13].sFor example, the implementation of asprocess responsible for securely transporting the keys has eight different modes ofsoperation.sSome key exchanges can be done automatically; others must ha... |
3 |
RFC 4732 : Internet Denial-of-Service Considerations. The Internet Engineering Task Force (IETF
- Handley, Rescorla
- 2006
(Show Context)
Citation Context ...p track of, the recordssgrow so large that the verification process takes too long to be practical.s40 THIS PAGE INTENTIONALLY LEFT BLANKs41 V.sEXPERIMENT TWO-ATTACK ON SENDsA denial of service (DoS) =-=[19]-=- attack is an explicit attempt of malicious users tosprevent legitimate users from using a service (e.g., a Web site).sDoS attacks are oftensachieved by means of resource exhaustion on the target mach... |
2 |
Address Resolution Protocol (arp)” [online
- Fairhurst
(Show Context)
Citation Context ... 6. Event timing of clients overwhelming a server ...............................................43sx THIS PAGE INTENTIONALLY LEFT BLANKsxi LIST OF FIGURESsFigure 1. Typical ARP packet exchange. From =-=[7]-=- ...........................................................6sFigure 2. Converting a MAC address into EUI-64 Interface Identifier. From [9] ............8sFigure 3. Logical placement of SeND in IPv6. .... |
2 |
IPv6 Network Administration
- Murphy, Malone
- 2005
(Show Context)
Citation Context ...ed IPsec infrastructure.sUsually, the verification of another host’s authenticity requires a highly secure centralsCertification Authority (CA).sSeND attempts to establish authenticity without the CAs=-=[14]-=-, [15].sA major question associated with using asymmetric cryptography is how to obtainsanother host’s public key in an authenticated manner.sSecure Socket Layers (SSL)sprotecting the web traffic is a... |
2 |
Beijnum, Running IPv6
- van
- 2006
(Show Context)
Citation Context ...ec infrastructure.sUsually, the verification of another host’s authenticity requires a highly secure centralsCertification Authority (CA).sSeND attempts to establish authenticity without the CAs[14], =-=[15]-=-.sA major question associated with using asymmetric cryptography is how to obtainsanother host’s public key in an authenticated manner.sSecure Socket Layers (SSL)sprotecting the web traffic is an exam... |