Sciweavers

WSS
2001

On the Security and Vulnerability of PING

14 years 24 days ago
On the Security and Vulnerability of PING
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is secure against weak adversaries (and insecure against strong ones). We then argue that despite the security of PING against weak adversaries, the natural vulnerability of this protocol (or of any other protocol for that matter) can be exploited by a weak adversary to launch a denial of service attack against any computer that hosts the protocol. Finally, we discuss three mechanisms, namely ingress filtering, hop integrity, and soft firewalls that can be used to prevent denial of service attacks in the Internet.
Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
Added 31 Oct 2010
Updated 31 Oct 2010
Type Conference
Year 2001
Where WSS
Authors Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
Comments (0)