Loading…
Vulnerabilities of reliable multicast protocols
We examine vulnerabilities of several reliable multicast protocols. The various mechanisms employed by these protocols to provide reliability can present vulnerabilities. We show how some of these vulnerabilities can be exploited in denial-of-service attacks, and discuss potential mechanisms for wit...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 938 vol.3 |
container_issue | |
container_start_page | 934 |
container_title | |
container_volume | 3 |
creator | Parks, T.M. Kassay, D.A. Weinstein, C.J. |
description | We examine vulnerabilities of several reliable multicast protocols. The various mechanisms employed by these protocols to provide reliability can present vulnerabilities. We show how some of these vulnerabilities can be exploited in denial-of-service attacks, and discuss potential mechanisms for withstanding such attacks. |
doi_str_mv | 10.1109/MILCOM.1998.726977 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_726977</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>726977</ieee_id><sourcerecordid>726977</sourcerecordid><originalsourceid>FETCH-LOGICAL-i104t-2e30677b3c5551afff25e63d3b58a0ade976c8a64f35819628897ef4053457c3</originalsourceid><addsrcrecordid>eNotj81qAjEURgOl0FZ9AVfzAjPezM3vsgz9EUbcSLeSiTeQEjuSxEXfvoL9Nmd3OB9jaw4d52A3u-047Hcdt9Z0uldW6wf2AtoACgmKP7FVKd9wm5DCWnxmm69r-qHspphijVSaOTSZUnRTouZ8TTV6V2pzyXOd_ZzKkj0Glwqt_rlgh_e3w_DZjvuP7fA6tpGDqG1PCErrCb2UkrsQQi9J4QknaRy4E1mtvHFKBJSGW9UbYzUFAfIWqj0u2PqujUR0vOR4dvn3eH-Ef7Q4QXc</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Vulnerabilities of reliable multicast protocols</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Parks, T.M. ; Kassay, D.A. ; Weinstein, C.J.</creator><creatorcontrib>Parks, T.M. ; Kassay, D.A. ; Weinstein, C.J.</creatorcontrib><description>We examine vulnerabilities of several reliable multicast protocols. The various mechanisms employed by these protocols to provide reliability can present vulnerabilities. We show how some of these vulnerabilities can be exploited in denial-of-service attacks, and discuss potential mechanisms for withstanding such attacks.</description><identifier>ISBN: 0780345061</identifier><identifier>ISBN: 9780780345065</identifier><identifier>DOI: 10.1109/MILCOM.1998.726977</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Computer crime ; Cryptographic protocols ; Cryptography ; Laboratories ; Multicast protocols ; Protection ; Public key ; Telecommunication network reliability ; Unicast</subject><ispartof>IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201), 1998, Vol.3, p.934-938 vol.3</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/726977$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,778,782,787,788,2054,4038,4039,27908,54903</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/726977$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Parks, T.M.</creatorcontrib><creatorcontrib>Kassay, D.A.</creatorcontrib><creatorcontrib>Weinstein, C.J.</creatorcontrib><title>Vulnerabilities of reliable multicast protocols</title><title>IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201)</title><addtitle>MILCOM</addtitle><description>We examine vulnerabilities of several reliable multicast protocols. The various mechanisms employed by these protocols to provide reliability can present vulnerabilities. We show how some of these vulnerabilities can be exploited in denial-of-service attacks, and discuss potential mechanisms for withstanding such attacks.</description><subject>Authentication</subject><subject>Computer crime</subject><subject>Cryptographic protocols</subject><subject>Cryptography</subject><subject>Laboratories</subject><subject>Multicast protocols</subject><subject>Protection</subject><subject>Public key</subject><subject>Telecommunication network reliability</subject><subject>Unicast</subject><isbn>0780345061</isbn><isbn>9780780345065</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>1998</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj81qAjEURgOl0FZ9AVfzAjPezM3vsgz9EUbcSLeSiTeQEjuSxEXfvoL9Nmd3OB9jaw4d52A3u-047Hcdt9Z0uldW6wf2AtoACgmKP7FVKd9wm5DCWnxmm69r-qHspphijVSaOTSZUnRTouZ8TTV6V2pzyXOd_ZzKkj0Glwqt_rlgh_e3w_DZjvuP7fA6tpGDqG1PCErrCb2UkrsQQi9J4QknaRy4E1mtvHFKBJSGW9UbYzUFAfIWqj0u2PqujUR0vOR4dvn3eH-Ef7Q4QXc</recordid><startdate>1998</startdate><enddate>1998</enddate><creator>Parks, T.M.</creator><creator>Kassay, D.A.</creator><creator>Weinstein, C.J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>1998</creationdate><title>Vulnerabilities of reliable multicast protocols</title><author>Parks, T.M. ; Kassay, D.A. ; Weinstein, C.J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i104t-2e30677b3c5551afff25e63d3b58a0ade976c8a64f35819628897ef4053457c3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>1998</creationdate><topic>Authentication</topic><topic>Computer crime</topic><topic>Cryptographic protocols</topic><topic>Cryptography</topic><topic>Laboratories</topic><topic>Multicast protocols</topic><topic>Protection</topic><topic>Public key</topic><topic>Telecommunication network reliability</topic><topic>Unicast</topic><toplevel>online_resources</toplevel><creatorcontrib>Parks, T.M.</creatorcontrib><creatorcontrib>Kassay, D.A.</creatorcontrib><creatorcontrib>Weinstein, C.J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Parks, T.M.</au><au>Kassay, D.A.</au><au>Weinstein, C.J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Vulnerabilities of reliable multicast protocols</atitle><btitle>IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201)</btitle><stitle>MILCOM</stitle><date>1998</date><risdate>1998</risdate><volume>3</volume><spage>934</spage><epage>938 vol.3</epage><pages>934-938 vol.3</pages><isbn>0780345061</isbn><isbn>9780780345065</isbn><abstract>We examine vulnerabilities of several reliable multicast protocols. The various mechanisms employed by these protocols to provide reliability can present vulnerabilities. We show how some of these vulnerabilities can be exploited in denial-of-service attacks, and discuss potential mechanisms for withstanding such attacks.</abstract><pub>IEEE</pub><doi>10.1109/MILCOM.1998.726977</doi></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 0780345061 |
ispartof | IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201), 1998, Vol.3, p.934-938 vol.3 |
issn | |
language | eng |
recordid | cdi_ieee_primary_726977 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authentication Computer crime Cryptographic protocols Cryptography Laboratories Multicast protocols Protection Public key Telecommunication network reliability Unicast |
title | Vulnerabilities of reliable multicast protocols |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T03%3A37%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Vulnerabilities%20of%20reliable%20multicast%20protocols&rft.btitle=IEEE%20Military%20Communications%20Conference.%20Proceedings.%20MILCOM%2098%20(Cat.%20No.98CH36201)&rft.au=Parks,%20T.M.&rft.date=1998&rft.volume=3&rft.spage=934&rft.epage=938%20vol.3&rft.pages=934-938%20vol.3&rft.isbn=0780345061&rft.isbn_list=9780780345065&rft_id=info:doi/10.1109/MILCOM.1998.726977&rft_dat=%3Cieee_6IE%3E726977%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i104t-2e30677b3c5551afff25e63d3b58a0ade976c8a64f35819628897ef4053457c3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=726977&rfr_iscdi=true |