Venkat Pothamsetty

Learn More
Previous scanning worms have beensignificant sources of network congestion and have had catastrophic effects on switches, routers and end-systems. In this paper, we focus on the simulation of the secondary resource-exhaustion effects that scanning worms cause on network protocols operating in Internet routers. Specifically, we describe a preliminary(More)
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute " right " packets relevant to the protocol and they specify what the response should be for such packets. They are often ambiguous and remain silent on what the protocol implementation should do for packets(More)
  • 1