000
| 01708nam 2200277za 4500 |
---|
001 | 9.807407 |
---|
003 | CaOODSP |
---|
005 | 20240219183356 |
---|
007 | cr ||||||||||| |
---|
008 | 150723s2014 onc ob f000 0 eng d |
---|
040 | |aCaOODSP|beng |
---|
041 | |aeng|bfre |
---|
043 | |an-cn--- |
---|
086 | 1 |aD68-2/146-2014E-PDF |
---|
100 | 1 |aDondo, Maxwell,|d1965- |
---|
245 | 10|aExperimental evaluation of the IP address space randomisation (IASR) technique and its disruption to selected network services |h[electronic resource] / |cMaxwell Dondo. |
---|
260 | |a[Ottawa] : |bDefence Research and Development Canada, |c2014. |
---|
300 | |avi, 26, [2] p. : |bfig. |
---|
490 | 1 |aScientific report ; |v2014-R146 |
---|
500 | |aNovember 2014. |
---|
504 | |aIncludes bibliographical references (p. 24-25). |
---|
520 | |aThis report was a deliverable for the Advanced Computer Network Operations (CNO) Tools and Techniques (ACTT) project, whose objective was to study advanced CNO tools and techniques for computer network defence. The experimental work to evaluate the internet protocol (IP) address space randomisation (IASR) technique and its disruptive effects on services in an operational network, partially shows what to expect if such technology is considered for network defence. If network planners and defenders consider IASR as a network defence technique, degradation in service performance that comes with it should be taken into consideration. |
---|
692 | 07|2gccst|aComputer security |
---|
710 | 2 |aDefence R&D Canada. |
---|
830 | #0|aScientific report (Defence R&D Canada)|v2014-R146|w(CaOODSP)9.802305 |
---|
856 | 40|qPDF|s316 KB|uhttps://publications.gc.ca/collections/collection_2015/rddc-drdc/D68-2-146-2014-eng.pdf |
---|