IP Paging Threat Analysis
draft-mutaf-paging-threats-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Pars Mutaf , Claude Castelluccia | ||
Last updated | 2002-02-26 | ||
RFC stream | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document is an analysis of threats that arise from using link layer paging technologies or IP paging in the Internet where denial-of-service attacks are common and easy. These problems fall in the scope of IP paging, since link layer paging technologies do not have provisions for repelling such threats and the source of an attack may be anywhere in the Internet. In addition, vulnerabilities that may be added by IP paging are also discussed.
Authors
Pars Mutaf
Claude Castelluccia
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)