Results 1 to 10 of about 14,435 (215)
An IPv6 address fast scanning method based on local domain name association [PDF]
With the increase of security issues in IPv6 networks, conducting address scanning in IPv6 networks proves beneficial for identifying potential security risks and vulnerabilities.
Yakai Fang+8 more
doaj +2 more sources
An IPv6 target generation approach based on address space forest [PDF]
IPv6 target generation techniques are crucial for Internet-wide rapid scanning of IPv6 network assets. Current algorithms are mostly limited to low-dimensional patterns (pattern dimensions $$\le$$ 4) within the IPv6 address space tree (6ASTree).
Shunlong Hao+9 more
doaj +2 more sources
Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic [PDF]
Botnets can simultaneously control millions of Internet-connected devices to launch damaging cyber-attacks that pose significant threats to the Internet. In a botnet, bot-masters communicate with the command and control server using various communication
Saif Al-mashhadi+3 more
doaj +2 more sources
The increasing incidence of distributed denial-of-service (DDoS) attacks has made software-defined networking (SDN) more vulnerable to the depletion of controller resources.
Mohammad Adnan Aladaileh+5 more
doaj +1 more source
Eth-PSD: A Machine Learning-Based Phishing Scam Detection Approach in Ethereum
Recently, the rapid flourish of blockchain technology in the financial field has attracted many cybercriminals’ attention to launching blockchain-based attacks such as ponzi schemes, scam wallets, and phishing scams.
Arkan Hammoodi Hasan Kabla+3 more
doaj +1 more source
Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for ...
Tariq Emad Ali+2 more
doaj +1 more source
Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information.
Wenhao Li+3 more
doaj +1 more source
Evaluación del Rendimiento de una red IPv6 utilizando IPSec en Modo Túnel
El espacio de direcciones IPv4 está a punto de llegar a su límite y podría colapsar, para corregir este evento muchos proponen que las redes existentes deberán realizar la migración definitiva a IPv6, tomando como referencia que este protocolo permitirá ...
Yumber Alejandro Ponce Loor+1 more
doaj +1 more source
Address Resolution (AR) and Duplicate Address Detection (DAD) are considered the most important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from each Internet Protocol version 6 (IPv6) host communicating with other ...
Ahmed K. Al-Ani+3 more
doaj +1 more source
Vehicular Ad hoc Networks (VANET) broadcast messages regarding road and environmental conditions. Due to its design, VANET inadvertently introduced security and privacy issues.
Mahmood A. Al-Shareeda+4 more
doaj +1 more source