An Efficient Method to Enhance IP Telephony Performance in IPV6 Networks [PDF]
IP telephony have played an essential role during the COVID 19 pandemic lockdown. One of the issues that lower the service level of the IP telephony solutions is the inefficient bandwidth exploitation.
Abualhaj Mosleh M. +3 more
doaj +2 more sources
Surfing the Internet-of-Things: Lightweight Access and Control ofWireless Sensor Networks Using Industrial Low Power Protocols [PDF]
Internet-of-Things (IoT) is emerging to play an important role in the continued advancement of information and communication technologies. To accelerate industrial application developments, the use of web services for networking applications is seen as ...
Zhengguo Sheng +2 more
doaj +4 more sources
An IPv6 address fast scanning method based on local domain name association [PDF]
With the increase of security issues in IPv6 networks, conducting address scanning in IPv6 networks proves beneficial for identifying potential security risks and vulnerabilities.
Yakai Fang +8 more
doaj +2 more sources
An IPv6 target generation approach based on address space forest [PDF]
IPv6 target generation techniques are crucial for Internet-wide rapid scanning of IPv6 network assets. Current algorithms are mostly limited to low-dimensional patterns (pattern dimensions $$\le$$ 4) within the IPv6 address space tree (6ASTree).
Shunlong Hao +9 more
doaj +2 more sources
Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic [PDF]
Botnets can simultaneously control millions of Internet-connected devices to launch damaging cyber-attacks that pose significant threats to the Internet. In a botnet, bot-masters communicate with the command and control server using various communication
Saif Al-mashhadi +3 more
doaj +2 more sources
Cost analysis of IPv6 distributed mobility management protocols in comparison with TFMIPv6. [PDF]
Aman M +6 more
europepmc +2 more sources
The increasing incidence of distributed denial-of-service (DDoS) attacks has made software-defined networking (SDN) more vulnerable to the depletion of controller resources.
Mohammad Adnan Aladaileh +5 more
doaj +1 more source
Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for ...
Tariq Emad Ali +2 more
doaj +1 more source
Eth-PSD: A Machine Learning-Based Phishing Scam Detection Approach in Ethereum
Recently, the rapid flourish of blockchain technology in the financial field has attracted many cybercriminals’ attention to launching blockchain-based attacks such as ponzi schemes, scam wallets, and phishing scams.
Arkan Hammoodi Hasan Kabla +3 more
doaj +1 more source
Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information.
Wenhao Li +3 more
doaj +1 more source

