1996
DOI: 10.17487/rfc1918
|View full text |Cite
|
Sign up to set email alerts
|

Address Allocation for Private Internets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
173
0
16

Year Published

2003
2003
2011
2011

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 396 publications
(189 citation statements)
references
References 3 publications
0
173
0
16
Order By: Relevance
“…For example in [67,12,54,64,35,49], best practice recommendations tend to be countermeasure-centric and do not consider explicitly the threats and vulnerabilities within their text-based description. Fenz et.…”
Section: Implicit Threats and Vulnerabilities In Best Practice Catalomentioning
confidence: 99%
See 1 more Smart Citation
“…For example in [67,12,54,64,35,49], best practice recommendations tend to be countermeasure-centric and do not consider explicitly the threats and vulnerabilities within their text-based description. Fenz et.…”
Section: Implicit Threats and Vulnerabilities In Best Practice Catalomentioning
confidence: 99%
“…For example, bogon firewall rules [35,49,67] are best-practice protection against spoofing-threats for internal servers and end-user workstations, while NIST recommend multiple countermeasures over an n-tier network hosting a Web-server [64]. This knowledge-base is searchable-a suitable countermeasure can be found for a given threat-and provides the basis for autonomic security configuration.…”
Section: Introductionmentioning
confidence: 99%
“…For example, it is considered best practice that NAC 's implement anti-spoofing bogon rules as described by [11,12,13] to protect its internal servers and end-user work stations. As a consequence, a NAC policy should prohibit incoming packets claiming to originate from the internal network.…”
Section: Configuration Recommendation Synthesismentioning
confidence: 99%
“…For example, bogon firewall rules [11,12,13] are best-practice protection against spoofing-threats for internal servers and end-user workstations, while NIST recommend multiple countermeasures over an n-tier network hosting a Web-server [14]. This knowledge-base is searchable-a suitable countermeasure/policy can be found for a given threatand provides the basis for autonomic security configuration.…”
Section: Introductionmentioning
confidence: 99%
“…For allocated blocks that are involved in prefix appearance, each of them contributes 5-6 new prefixes regardless of the age. While for allocated blocks involved in prefix disappearance, each of them corresponds to 4-6 removed prefixes 4 .…”
Section: B Composition Of Table Growth Contributed By New Allocationmentioning
confidence: 99%