Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Ingress filtering

Known as: BCP 38, Ingress, RFC 2827 
In computer networking, ingress filtering is a technique used to ensure that incoming packets are actually from the networks from which they claim to… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
In 2012, the Dutch National Research and Education Network, SURFnet, observed a multitude of Distributed Denial of Service (DDoS… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Review
2011
Review
2011
Failure of backbone nodes/links can have catastrophic consequences unless they are addressed in a timely manner. Multi-Protocol… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
2007
2007
We consider an ingress optical burst switching (OBS) node employing the JumpStart signaling protocol. The switch serves a number… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2005
2005
The note presents a set of mechanisms to provide ingress filtering compatibility for legacy hosts in IPv6 multihomed sites. 
Highly Cited
2004
Highly Cited
2004
BCP 38, RFC 2827, is designed to limit the impact of distributed denial of service attacks, by denying traffic with spoofed… Expand
2004
2004
Firewalls offer a protection for private networks against both internal and external attacks. However, configuring firewalls to… Expand
  • figure 2
2002
2002
  • M. Waldvogel
  • 18th Annual Computer Security Applications…
  • 2002
  • Corpus ID: 13075387
To identify sources of distributed denial-of-service attacks, path traceback mechanisms have been proposed. Traceback mechanisms… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • table II
2001
2001
A class of packet switching systems with inverse multiplexing of switched connections and/or flows (the SCIMUX architecture) has… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2000
Highly Cited
2000
This paper presents a new algorithm for dynamic routing of bandwidth-guaranteed tunnels when tunnel routing requests arrive one… Expand
  • figure 3
  • figure 4
  • figure 5
  • figure 7
  • figure 6
Highly Cited
1998
Highly Cited
1998
Recent occurrences of various Denial of Service (DoS) attacks which have employed forged source addresses have proven to be a… Expand