L. L. Peterson’s research while affiliated with Princeton University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (3)


Network Security: Know it all
  • Article

January 2008

·

74 Reads

·

11 Citations

·

S. Bagchi

·

B.S. Davie

·

[...]

·

P. Zheng

Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the fields leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources. * Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise. * Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints. * Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions. * Examples illustrate core security concepts for enhanced comprehension.



Citations (2)


... In a DDoS attack, a large volume of network packets is generated to flood a target host without using an intermediary. In contrast to DDoS attacks, which do not mask the sender's source IP address, a reflection attack is a special type of DDoS attack that uses any TCP or UDP-based service as a reflector and masks the sender's source IP address (Joshi 2008). A spoofed network packet, where the source IP address is replaced by the IP address of another device, is typically used to send the response to the victim. ...

Reference:

An Empirical Study of Reflection Attacks Using NetFlow Data
Network Security: Know it all
  • Citing Article
  • January 2008