Results 1 to 10 of about 14,618 (242)

An IPv6 address fast scanning method based on local domain name association [PDF]

open access: yesScientific Reports
With the increase of security issues in IPv6 networks, conducting address scanning in IPv6 networks proves beneficial for identifying potential security risks and vulnerabilities.
Yakai Fang   +8 more
doaj   +2 more sources

An evaluation of IPv6 multicast router in JGN IPv6 networks [PDF]

open access: green2004 International Symposium on Applications and the Internet Workshops. 2004 Workshops., 2004
This paper describes an evaluation of IPv6 multicast routers. The JGN IPv6 project has performed various evaluations and verifications of IPv6 routers. Seven (7) types of routers from six vendors were tested, for which PIM-SM was employed as an IPv6 multicast protocol for the evaluation.
Yukiji Mikamo   +5 more
openalex   +2 more sources

Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic [PDF]

open access: yesPeerJ Computer Science, 2021
Botnets can simultaneously control millions of Internet-connected devices to launch damaging cyber-attacks that pose significant threats to the Internet. In a botnet, bot-masters communicate with the command and control server using various communication
Saif Al-mashhadi   +3 more
doaj   +2 more sources

Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates

open access: yesApplied Sciences, 2022
The increasing incidence of distributed denial-of-service (DDoS) attacks has made software-defined networking (SDN) more vulnerable to the depletion of controller resources.
Mohammad Adnan Aladaileh   +5 more
doaj   +1 more source

Eth-PSD: A Machine Learning-Based Phishing Scam Detection Approach in Ethereum

open access: yesIEEE Access, 2022
Recently, the rapid flourish of blockchain technology in the financial field has attracted many cybercriminals’ attention to launching blockchain-based attacks such as ponzi schemes, scam wallets, and phishing scams.
Arkan Hammoodi Hasan Kabla   +3 more
doaj   +1 more source

Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices

open access: yesIET Networks, Volume 12, Issue 1, Page 1-8, January 2023., 2023
Abstract In the era of the Internet of things (IoT), billions of electrical devices are connected to the Internet and communicate remotely with one another without any human intervention. IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns.
Selvakumar Manickam, Shafiq Ul Rehman
wiley   +1 more source

Evaluación del Rendimiento de una red IPv6 utilizando IPSec en Modo Túnel

open access: yesInformática y Sistemas, 2023
El espacio de direcciones IPv4 está a punto de llegar a su límite y podría colapsar, para corregir este evento muchos proponen que las redes existentes deberán realizar la migración definitiva a IPv6, tomando como referencia que este protocolo permitirá ...
Yumber Alejandro Ponce Loor   +1 more
doaj   +1 more source

Trigonometric words ranking model for spam message classification

open access: yesIET Networks, EarlyView., 2022
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi   +7 more
wiley   +1 more source

ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK [PDF]

open access: yesActa Electrotechnica et Informatica, 2021
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end
Cyril Filip KOVACIK, Gabriel BUGAR
doaj   +1 more source

Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN

open access: yesApplied Sciences, 2023
Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for ...
Tariq Emad Ali   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy