作者: Shashidhar Gandham , Khawar Deen , Shih-Chun Chang , Navindra Yadav , Abhishek Ranjan Singh
DOI:
关键词:
摘要: Managing a network environment to identify spoofed packets is disclosed. A method includes analyzing, via first capture agent, processed by in associated with host, and second the host. The collecting data at collector generating topological map of history activity environment. extracting from packet comparing extracted stored database. When comparison indicates that does not match (i.e., reported source an expected for packet), determining packet.