Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malformed packets
biblio
Detecting and Preventing IP Spoofing and Local Area Network Denial (LAND) Attack for Cloud Computing with the Modification of Hop Count Filtering (HCF) Mechanism
Submitted by aekwall on Mon, 06/29/2020 - 12:05pm
memory exhaustion minimization
Internet Protocol
IP
IP spoofing detection
IP spoofing prevention
IP2HC table
LAND attack
LAND based DDoS attack
local area network denial attack
malformed packets
hop count filtering mechanism
smurf attack
Source port
spoofed packets
SYN flood attack
teardrop attack
TTL
victim server
virtual cloud environment
internet
Cloud Computing
IP networks
distributed denial of service attack
Resiliency
Human behavior
pubcrawl
composability
Metrics
computer network security
Local area networks
IP spoofing
Flooding Attack
DDoS Attack Prevention
CloudSim 3.0 toolkit
Distributed Denial of Service(DDoS)
HCF mechanism
Hop Count Filtering (HCF)
biblio
A hierarchical approach to self-test, fault-tolerance and routing security in a Network-on-Chip
Submitted by grigby1 on Fri, 05/15/2020 - 11:44am
packet-switching
local self-test manager
malformed packets
malicious denial-of-service attack
malicious external agent
microprocessor chips
multiprocessing systems
network bandwidth
network-on-chip
NoC
on-chip networks
packet switching
local router
power virus
routing agent
routing security
security concerns
sorting-based algorithm
telecommunication network routing
test algorithms
two-tier approach
two-tier solution
virtual channel flow control
virtual channels
deadlock-free properties
Scalability
resilience
Resiliency
Metrics
associated physical channels
bus interconnects
chip multiprocessors
communication efficiency
computer network reliability
computer network security
deadlock situation
network on chip security
denial-of-service attacks
external source
fault data
fault tolerant computing
fault-information
fault-tolerance aspects
fault-tolerant routing
flit-switching
hierarchical approach
internet
local processing element