Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
On the Security and Vulnerability of PING Mohamed G. Gouda Chin-Tser Huang Anish Arora
 

Summary: 1
On the Security and Vulnerability of PING
Mohamed G. Gouda Chin-Tser Huang Anish Arora
Department of Computer Sciences
The University of Texas at Austin
{gouda, chuang}@cs.utexas.edu

Department of Computer and Information Science
The Ohio State University
anish@cis.ohio-state.edu
April 20, 2001
Abstract
We present a formal specification of the PING protocol, and use
three concepts of convergence theory, namely closure, convergence,
and protection, to show that this protocol is secure against weak
adversaries (and insecure against strong ones). We then argue that
despite the security of PING against weak adversaries, the natural
vulnerability of this protocol (or of any other protocol for that matter)
can be exploited by a weak adversary to launch a denial of service
attack against any computer that hosts the protocol. Finally, we discuss

  

Source: Arora, Anish - Department of Computer Science and Engineering, Ohio State University

 

Collections: Computer Technologies and Information Sciences