Loading…

Vulnerabilities of reliable multicast protocols

We examine vulnerabilities of several reliable multicast protocols. The various mechanisms employed by these protocols to provide reliability can present vulnerabilities. We show how some of these vulnerabilities can be exploited in denial-of-service attacks, and discuss potential mechanisms for wit...

Full description

Saved in:
Bibliographic Details
Main Authors: Parks, T.M., Kassay, D.A., Weinstein, C.J.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 938 vol.3
container_issue
container_start_page 934
container_title
container_volume 3
creator Parks, T.M.
Kassay, D.A.
Weinstein, C.J.
description We examine vulnerabilities of several reliable multicast protocols. The various mechanisms employed by these protocols to provide reliability can present vulnerabilities. We show how some of these vulnerabilities can be exploited in denial-of-service attacks, and discuss potential mechanisms for withstanding such attacks.
doi_str_mv 10.1109/MILCOM.1998.726977
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_726977</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>726977</ieee_id><sourcerecordid>726977</sourcerecordid><originalsourceid>FETCH-LOGICAL-i104t-2e30677b3c5551afff25e63d3b58a0ade976c8a64f35819628897ef4053457c3</originalsourceid><addsrcrecordid>eNotj81qAjEURgOl0FZ9AVfzAjPezM3vsgz9EUbcSLeSiTeQEjuSxEXfvoL9Nmd3OB9jaw4d52A3u-047Hcdt9Z0uldW6wf2AtoACgmKP7FVKd9wm5DCWnxmm69r-qHspphijVSaOTSZUnRTouZ8TTV6V2pzyXOd_ZzKkj0Glwqt_rlgh_e3w_DZjvuP7fA6tpGDqG1PCErrCb2UkrsQQi9J4QknaRy4E1mtvHFKBJSGW9UbYzUFAfIWqj0u2PqujUR0vOR4dvn3eH-Ef7Q4QXc</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Vulnerabilities of reliable multicast protocols</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Parks, T.M. ; Kassay, D.A. ; Weinstein, C.J.</creator><creatorcontrib>Parks, T.M. ; Kassay, D.A. ; Weinstein, C.J.</creatorcontrib><description>We examine vulnerabilities of several reliable multicast protocols. The various mechanisms employed by these protocols to provide reliability can present vulnerabilities. We show how some of these vulnerabilities can be exploited in denial-of-service attacks, and discuss potential mechanisms for withstanding such attacks.</description><identifier>ISBN: 0780345061</identifier><identifier>ISBN: 9780780345065</identifier><identifier>DOI: 10.1109/MILCOM.1998.726977</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Computer crime ; Cryptographic protocols ; Cryptography ; Laboratories ; Multicast protocols ; Protection ; Public key ; Telecommunication network reliability ; Unicast</subject><ispartof>IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201), 1998, Vol.3, p.934-938 vol.3</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/726977$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,778,782,787,788,2054,4038,4039,27908,54903</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/726977$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Parks, T.M.</creatorcontrib><creatorcontrib>Kassay, D.A.</creatorcontrib><creatorcontrib>Weinstein, C.J.</creatorcontrib><title>Vulnerabilities of reliable multicast protocols</title><title>IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201)</title><addtitle>MILCOM</addtitle><description>We examine vulnerabilities of several reliable multicast protocols. The various mechanisms employed by these protocols to provide reliability can present vulnerabilities. We show how some of these vulnerabilities can be exploited in denial-of-service attacks, and discuss potential mechanisms for withstanding such attacks.</description><subject>Authentication</subject><subject>Computer crime</subject><subject>Cryptographic protocols</subject><subject>Cryptography</subject><subject>Laboratories</subject><subject>Multicast protocols</subject><subject>Protection</subject><subject>Public key</subject><subject>Telecommunication network reliability</subject><subject>Unicast</subject><isbn>0780345061</isbn><isbn>9780780345065</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>1998</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj81qAjEURgOl0FZ9AVfzAjPezM3vsgz9EUbcSLeSiTeQEjuSxEXfvoL9Nmd3OB9jaw4d52A3u-047Hcdt9Z0uldW6wf2AtoACgmKP7FVKd9wm5DCWnxmm69r-qHspphijVSaOTSZUnRTouZ8TTV6V2pzyXOd_ZzKkj0Glwqt_rlgh_e3w_DZjvuP7fA6tpGDqG1PCErrCb2UkrsQQi9J4QknaRy4E1mtvHFKBJSGW9UbYzUFAfIWqj0u2PqujUR0vOR4dvn3eH-Ef7Q4QXc</recordid><startdate>1998</startdate><enddate>1998</enddate><creator>Parks, T.M.</creator><creator>Kassay, D.A.</creator><creator>Weinstein, C.J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>1998</creationdate><title>Vulnerabilities of reliable multicast protocols</title><author>Parks, T.M. ; Kassay, D.A. ; Weinstein, C.J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i104t-2e30677b3c5551afff25e63d3b58a0ade976c8a64f35819628897ef4053457c3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>1998</creationdate><topic>Authentication</topic><topic>Computer crime</topic><topic>Cryptographic protocols</topic><topic>Cryptography</topic><topic>Laboratories</topic><topic>Multicast protocols</topic><topic>Protection</topic><topic>Public key</topic><topic>Telecommunication network reliability</topic><topic>Unicast</topic><toplevel>online_resources</toplevel><creatorcontrib>Parks, T.M.</creatorcontrib><creatorcontrib>Kassay, D.A.</creatorcontrib><creatorcontrib>Weinstein, C.J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Parks, T.M.</au><au>Kassay, D.A.</au><au>Weinstein, C.J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Vulnerabilities of reliable multicast protocols</atitle><btitle>IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201)</btitle><stitle>MILCOM</stitle><date>1998</date><risdate>1998</risdate><volume>3</volume><spage>934</spage><epage>938 vol.3</epage><pages>934-938 vol.3</pages><isbn>0780345061</isbn><isbn>9780780345065</isbn><abstract>We examine vulnerabilities of several reliable multicast protocols. The various mechanisms employed by these protocols to provide reliability can present vulnerabilities. We show how some of these vulnerabilities can be exploited in denial-of-service attacks, and discuss potential mechanisms for withstanding such attacks.</abstract><pub>IEEE</pub><doi>10.1109/MILCOM.1998.726977</doi></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 0780345061
ispartof IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201), 1998, Vol.3, p.934-938 vol.3
issn
language eng
recordid cdi_ieee_primary_726977
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Authentication
Computer crime
Cryptographic protocols
Cryptography
Laboratories
Multicast protocols
Protection
Public key
Telecommunication network reliability
Unicast
title Vulnerabilities of reliable multicast protocols
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T03%3A37%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Vulnerabilities%20of%20reliable%20multicast%20protocols&rft.btitle=IEEE%20Military%20Communications%20Conference.%20Proceedings.%20MILCOM%2098%20(Cat.%20No.98CH36201)&rft.au=Parks,%20T.M.&rft.date=1998&rft.volume=3&rft.spage=934&rft.epage=938%20vol.3&rft.pages=934-938%20vol.3&rft.isbn=0780345061&rft.isbn_list=9780780345065&rft_id=info:doi/10.1109/MILCOM.1998.726977&rft_dat=%3Cieee_6IE%3E726977%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i104t-2e30677b3c5551afff25e63d3b58a0ade976c8a64f35819628897ef4053457c3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=726977&rfr_iscdi=true