Results 1 to 10 of about 76,542 (243)

Surfing the Internet-of-Things: Lightweight Access and Control ofWireless Sensor Networks Using Industrial Low Power Protocols [PDF]

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2014
Internet-of-Things (IoT) is emerging to play an important role in the continued advancement of information and communication technologies. To accelerate industrial application developments, the use of web services for networking applications is seen as ...
Zhengguo Sheng   +2 more
doaj   +4 more sources

An Efficient Method to Enhance IP Telephony Performance in IPV6 Networks [PDF]

open access: diamondCybernetics and Information Technologies, 2021
IP telephony have played an essential role during the COVID 19 pandemic lockdown. One of the issues that lower the service level of the IP telephony solutions is the inefficient bandwidth exploitation.
Abualhaj Mosleh M.   +3 more
doaj   +2 more sources

Match-Prevention Technique Against Denial-of-Service Attack on Address Resolution and Duplicate Address Detection Processes in IPv6 Link-Local Network

open access: yesIEEE Access, 2020
Address Resolution (AR) and Duplicate Address Detection (DAD) are considered the most important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from each Internet Protocol version 6 (IPv6) host communicating with other ...
Ahmed K. Al-Ani   +3 more
doaj   +2 more sources

An IPv6 address fast scanning method based on local domain name association [PDF]

open access: yesScientific Reports
With the increase of security issues in IPv6 networks, conducting address scanning in IPv6 networks proves beneficial for identifying potential security risks and vulnerabilities.
Yakai Fang   +8 more
doaj   +2 more sources

An IPv6 target generation approach based on address space forest [PDF]

open access: yesScientific Reports
IPv6 target generation techniques are crucial for Internet-wide rapid scanning of IPv6 network assets. Current algorithms are mostly limited to low-dimensional patterns (pattern dimensions $$\le$$  4) within the IPv6 address space tree (6ASTree).
Shunlong Hao   +9 more
doaj   +2 more sources

Cost analysis of IPv6 distributed mobility management protocols in comparison with TFMIPv6. [PDF]

open access: goldPLoS One
Aman M   +6 more
europepmc   +2 more sources

Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic [PDF]

open access: yesPeerJ Computer Science, 2021
Botnets can simultaneously control millions of Internet-connected devices to launch damaging cyber-attacks that pose significant threats to the Internet. In a botnet, bot-masters communicate with the command and control server using various communication
Saif Al-mashhadi   +3 more
doaj   +2 more sources

IPv6 Hitlists at Scale: Be Careful What You Wish For [PDF]

open access: yesConference on Applications, Technologies, Architectures, and Protocols for Computer Communication, 2023
Today's network measurements rely heavily on Internet-wide scanning, employing tools like ZMap that are capable of quickly iterating over the entire IPv4 address space.
Erik C. Rye, Dave Levin
semanticscholar   +1 more source

Target Acquired? Evaluating Target Generation Algorithms for IPv6 [PDF]

open access: yesTraffic Monitoring and Analysis, 2023
Internet measurements are a crucial foundation of IPv6-related research. Due to the infeasibility of full address space scans for IPv6 however, those measurements rely on collections of reliably responsive, unbiased addresses, as provided e.g., by the ...
Lion Steger   +4 more
semanticscholar   +1 more source

How Ready Is DNS for an IPv6-Only World? [PDF]

open access: yesPassive and Active Network Measurement Conference, 2023
DNS is one of the core building blocks of the Internet. In this paper, we investigate DNS resolution in a strict IPv6-only scenario and find that a substantial fraction of zones cannot be resolved.
Florian Streibelt   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy