Data-Link Layer Traceback in Ethernet Networks

The design of the most commonly-used Internet and Local Area Network protocols provide no way of verifying the sender of a packet is who it claims to be. Protocols and applications exist that provide authentication but these are generally for special use cases. A malicious host can easily launch a...

Full description

Bibliographic Details
Main Author: Snow, Michael Thomas
Other Authors: Electrical and Computer Engineering
Format: Others
Published: Virginia Tech 2014
Subjects:
Online Access:http://hdl.handle.net/10919/35839
http://scholar.lib.vt.edu/theses/available/etd-11282006-130305/