Vulnerabilities of reliable multicast protocols
We examine vulnerabilities of several reliable multicast protocols. The various mechanisms employed by these protocols to provide reliability can present vulnerabilities. We show how some of these vulnerabilities can be exploited in denial-of-service attacks, and discuss potential mechanisms for wit...
Saved in:
Published in: | IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201) Vol. 3; pp. 934 - 938 vol.3 |
---|---|
Main Authors: | , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
1998
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | We examine vulnerabilities of several reliable multicast protocols. The various mechanisms employed by these protocols to provide reliability can present vulnerabilities. We show how some of these vulnerabilities can be exploited in denial-of-service attacks, and discuss potential mechanisms for withstanding such attacks. |
---|---|
ISBN: | 0780345061 9780780345065 |
DOI: | 10.1109/MILCOM.1998.726977 |