Results 1 to 10 of about 14,615 (207)
An Efficient Method to Enhance IP Telephony Performance in IPV6 Networks [PDF]
IP telephony have played an essential role during the COVID 19 pandemic lockdown. One of the issues that lower the service level of the IP telephony solutions is the inefficient bandwidth exploitation.
Abualhaj Mosleh M. +3 more
doaj +2 more sources
An IPv6 address fast scanning method based on local domain name association [PDF]
With the increase of security issues in IPv6 networks, conducting address scanning in IPv6 networks proves beneficial for identifying potential security risks and vulnerabilities.
Yakai Fang +8 more
doaj +2 more sources
An IPv6 target generation approach based on address space forest [PDF]
IPv6 target generation techniques are crucial for Internet-wide rapid scanning of IPv6 network assets. Current algorithms are mostly limited to low-dimensional patterns (pattern dimensions $$\le$$ 4) within the IPv6 address space tree (6ASTree).
Shunlong Hao +9 more
doaj +2 more sources
Cost analysis of IPv6 distributed mobility management protocols in comparison with TFMIPv6. [PDF]
Aman M +6 more
europepmc +2 more sources
Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic [PDF]
Botnets can simultaneously control millions of Internet-connected devices to launch damaging cyber-attacks that pose significant threats to the Internet. In a botnet, bot-masters communicate with the command and control server using various communication
Saif Al-mashhadi +3 more
doaj +2 more sources
The increasing incidence of distributed denial-of-service (DDoS) attacks has made software-defined networking (SDN) more vulnerable to the depletion of controller resources.
Mohammad Adnan Aladaileh +5 more
doaj +1 more source
Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for ...
Tariq Emad Ali +2 more
doaj +1 more source
Eth-PSD: A Machine Learning-Based Phishing Scam Detection Approach in Ethereum
Recently, the rapid flourish of blockchain technology in the financial field has attracted many cybercriminals’ attention to launching blockchain-based attacks such as ponzi schemes, scam wallets, and phishing scams.
Arkan Hammoodi Hasan Kabla +3 more
doaj +1 more source
Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information.
Wenhao Li +3 more
doaj +1 more source
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security ...
Tariq Emad Ali +2 more
doaj +1 more source

