Vulnerabilities of reliable multicast protocols

We examine vulnerabilities of several reliable multicast protocols. The various mechanisms employed by these protocols to provide reliability can present vulnerabilities. We show how some of these vulnerabilities can be exploited in denial-of-service attacks, and discuss potential mechanisms for wit...

Full description

Saved in:
Bibliographic Details
Published in:IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201) Vol. 3; pp. 934 - 938 vol.3
Main Authors: Parks, T.M., Kassay, D.A., Weinstein, C.J.
Format: Conference Proceeding
Language:English
Published: IEEE 1998
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:We examine vulnerabilities of several reliable multicast protocols. The various mechanisms employed by these protocols to provide reliability can present vulnerabilities. We show how some of these vulnerabilities can be exploited in denial-of-service attacks, and discuss potential mechanisms for withstanding such attacks.
ISBN:0780345061
9780780345065
DOI:10.1109/MILCOM.1998.726977