UD ELEG 867 - Security in the Internet Swamp (2 pages)

Previewing page 1 of 2 page document View the full content.
View Full Document

Security in the Internet Swamp



Previewing page 1 of actual document.

View the full content.
View Full Document
View Full Document

Security in the Internet Swamp

56 views


Pages:
2
School:
University of Delaware
Course:
Eleg 867 - Seminar: Applied Optics & Photonics
Seminar: Applied Optics & Photonics Documents

Unformatted text preview:

A Maze of Twisty Turney Passages Security in the Internet Swamp and other adventures David L Mills University of Delaware http www eecis udel edu mills mills udel edu Jan 14 2019 When you are up to your ass in alligators it is wise to remember you are there to drain the swamp R M Nixon 1 Introduction and Overview Security architectures protocols and algorithms beyond IPSEC Cryptographic techniques for ubiquitous distributed services System high multi level and intersecting group architecture Zero knowledge Identity schemes Finding the terrorists elephants and mice Traceback practical and impractical techniques Traffic analysis sampling techniques Resisting attacks Disclosure inadvertent and otherwise Middleman message modification and or replay Clogging flooding clogging and denial of service Multicast and wireless issues Protocol vulnerabilities stack SYN flood and crypto vulnerabilities Next generation Internet security DNS NTP BGP P2P Jan 14 2019 2



View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Security in the Internet Swamp and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Security in the Internet Swamp and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?