Results 1 to 10 of about 14,618 (242)
An IPv6 address fast scanning method based on local domain name association [PDF]
With the increase of security issues in IPv6 networks, conducting address scanning in IPv6 networks proves beneficial for identifying potential security risks and vulnerabilities.
Yakai Fang+8 more
doaj +2 more sources
An evaluation of IPv6 multicast router in JGN IPv6 networks [PDF]
This paper describes an evaluation of IPv6 multicast routers. The JGN IPv6 project has performed various evaluations and verifications of IPv6 routers. Seven (7) types of routers from six vendors were tested, for which PIM-SM was employed as an IPv6 multicast protocol for the evaluation.
Yukiji Mikamo+5 more
openalex +2 more sources
Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic [PDF]
Botnets can simultaneously control millions of Internet-connected devices to launch damaging cyber-attacks that pose significant threats to the Internet. In a botnet, bot-masters communicate with the command and control server using various communication
Saif Al-mashhadi+3 more
doaj +2 more sources
The increasing incidence of distributed denial-of-service (DDoS) attacks has made software-defined networking (SDN) more vulnerable to the depletion of controller resources.
Mohammad Adnan Aladaileh+5 more
doaj +1 more source
Eth-PSD: A Machine Learning-Based Phishing Scam Detection Approach in Ethereum
Recently, the rapid flourish of blockchain technology in the financial field has attracted many cybercriminals’ attention to launching blockchain-based attacks such as ponzi schemes, scam wallets, and phishing scams.
Arkan Hammoodi Hasan Kabla+3 more
doaj +1 more source
Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices
Abstract In the era of the Internet of things (IoT), billions of electrical devices are connected to the Internet and communicate remotely with one another without any human intervention. IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns.
Selvakumar Manickam, Shafiq Ul Rehman
wiley +1 more source
Evaluación del Rendimiento de una red IPv6 utilizando IPSec en Modo Túnel
El espacio de direcciones IPv4 está a punto de llegar a su límite y podría colapsar, para corregir este evento muchos proponen que las redes existentes deberán realizar la migración definitiva a IPv6, tomando como referencia que este protocolo permitirá ...
Yumber Alejandro Ponce Loor+1 more
doaj +1 more source
Trigonometric words ranking model for spam message classification
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi+7 more
wiley +1 more source
ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK [PDF]
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end
Cyril Filip KOVACIK, Gabriel BUGAR
doaj +1 more source
Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for ...
Tariq Emad Ali+2 more
doaj +1 more source