The Community for Technology Leaders
Intelligent Information Technology Applications, 2007 Workshop on (2007)
Zhang Jiajia, China
Dec. 2, 2007 to Dec. 3, 2007
ISBN: 0-7695-3063-X
pp: 99-102
ABSTRACT
CRC and checksum are two error-detecting mechanisms widely used in the computer network. A novice evaluating simulation model based on attacking these two codes is proposed and the correspondent evaluating methods are discussed. In this model, the size and content of any data packet is produced by random number generator and the changes of the packet?s content is implemented by simulating natural and manual attacks. The results show that these two error-detecting codes have the strong ability against natural attacks, but no ability against manual attacks which facilitate the destruction of data authentication and data-accessing availability.
INDEX TERMS
null
CITATION

M. Jiang and M. Hu, "Simulation of Attacks on Network-based Error Detection," Intelligent Information Technology Applications, 2007 Workshop on(IITA), Zhang Jiajia, China, 2007, pp. 99-102.
doi:10.1109/IITA.2007.75
92 ms
(Ver 3.3 (11022016))