An Acceptable Use Policy for New ICMP Types and Codes

نویسندگان

  • Melinda Shore
  • Carlos Pignataro
چکیده

This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhancing Cocoa Beans Quality through Improved Cultural Practices in Major Cocoa Producing States of Nigeria

In West Africa, low adoption of agricultural innovations by farmers has been partly due to the complexity of the innovation structure or new knowledge beyond the farmers’ socio-economic adaptive capacities. Different attempts have been made to improve cocoa beans quality in Nigeria among which was the recommendation of ‘improved cultural practices’ or ‘best known practices’ (ICMP). This had rec...

متن کامل

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

Malicious ICMP Tunneling: Defense against the Vulnerability

This paper presents a systematic solution to the problem of using ICMP tunneling for covert channel. ICMP is not multiplexed via port numbers and the data part of the ICMP packet provides considerable bandwidth for malicious covert channels. These factors make it an integral part of many malicious software like remote access and denial of service attack tools. These tools use ICMP to establish ...

متن کامل

Policy Entrepreneurship: Case of Thermal Power Production Holding

One of the requirements for the development of societies and organizations is innovation, change in policies and policies, and the use of creative models in decision making. To achieve this goal, organizations must explore opportunities and identify new solutions and possibilities, and apply innovation in decisions. How to identify these opportunities and use them has always been a concern of p...

متن کامل

Search Based Weighted Multi-Bit Flipping Algorithm for High-Performance Low-Complexity Decoding of LDPC Codes

In this paper, two new hybrid algorithms are proposed for decoding Low Density Parity Check (LDPC) codes. Original version of the proposed algorithms named Search Based Weighted Multi Bit Flipping (SWMBF). The main idea of these algorithms is flipping variable multi bits in each iteration, change in which leads to the syndrome vector with least hamming weight. To achieve this, the proposed algo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • RFC

دوره 7279  شماره 

صفحات  -

تاریخ انتشار 2014