Results 181 to 190 of about 14,435 (215)
The motivation of IP traceback is to identify the true source of an IP datagram in Internet. These techniques are now emerging as effective deterrent for current cyber threats, especially (D)DoS. Deterministic packet marking (DPM) is one of the algorithms used for IP traceback.
Choong Seon Hong, Syed Obaid Amin
openaire +1 more source
On the issues of IP traceback for IPv6 and mobile IPv6 [PDF]
As the Internet becomes pervasive, the vulnerability of some fundamental design aspects of the Internet has also become significant. Among which, denial-of-service (DoS) and distributed DoS (DDoS) pose significant problems, as they are disruptive to the useful traffics and are hard to prevent.
Vrizlynn L. L. Thing+3 more
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings Third IEEE Symposium on Computers and Communications. ISCC'98. (Cat. No.98EX166), 2002
The Dynamic Host Configuration Protocol (DHCPv6) provides a framework for passing configuration information via extensions, to IPv6 nodes. It offers the capability of automatic allocation of reusable network addresses and additional configuration flexibility.
Charles E. Perkins, J. Bound
openaire +2 more sources
The Dynamic Host Configuration Protocol (DHCPv6) provides a framework for passing configuration information via extensions, to IPv6 nodes. It offers the capability of automatic allocation of reusable network addresses and additional configuration flexibility.
Charles E. Perkins, J. Bound
openaire +2 more sources
SPIE-IPv6: single IPv6 packet traceback
29th Annual IEEE International Conference on Local Computer Networks, 2004The source path isolation engine (SPIE), developed at BBN, provides accurate tracing of single IP packets through a network. The SPIE system calculates several small hash values for each packet as it traverses a router, then stores these values in a data structure called a Bloom filter.
William Timothy Strayer+3 more
openaire +2 more sources
2010 2nd International Conference on Advanced Computer Control, 2010
Fear of security breaches has been a major reason for the busniness world's reluctance to embrace the internet as a viable means of communication. This paper discusses the current security measures available for the IPv4 infrastructure. The paper is addressed to readers with a basic understanding of common security mechanisms including some kinds of ...
Qiao Guo, Dequan Yang, Xu Song
openaire +2 more sources
Fear of security breaches has been a major reason for the busniness world's reluctance to embrace the internet as a viable means of communication. This paper discusses the current security measures available for the IPv4 infrastructure. The paper is addressed to readers with a basic understanding of common security mechanisms including some kinds of ...
Qiao Guo, Dequan Yang, Xu Song
openaire +2 more sources
IPv6 and Extended IPv6 (IPv6++) Features That Enable Autonomic Network Setup and Operation
2011In this paper we present an insight on the IPv6 features and a few examples of propositions for Extensions to IPv6 protocols, which enable autonomic network set-up and operation. The concept of autonomicity-realized through control-loop structures embedded within node/device architectures and the overall network architecture as a whole is an enabler ...
Slawomir Kuklinski+5 more
openaire +2 more sources
Are we ready for IPv6? Is IPv6 ready for us?
International Journal of Network Management, 2005This article presents the hands-on experiences of a group of advanced computer networking undergraduates, under the guidance of the author, in setting up an IPv6 network. We concluded that though IPv6 has many positive features, it still isn't totally ripe. In particular, there is a shortage of application software and methods to configure the clients'
openaire +2 more sources
2009
Publisher Summary Networks are migrating from Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6) offering several advantages, in the recent years. The autoconfiguration capabilities of IPv6 simplify network administration. IPv6 addresses can be autoconfigured in a couple of ways and can include the device's Media Access Control ...
Dale Liu, Brian Barber, Luigi DiGrande
openaire +2 more sources
Publisher Summary Networks are migrating from Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6) offering several advantages, in the recent years. The autoconfiguration capabilities of IPv6 simplify network administration. IPv6 addresses can be autoconfigured in a couple of ways and can include the device's Media Access Control ...
Dale Liu, Brian Barber, Luigi DiGrande
openaire +2 more sources
Proceedings of the International Conference on Mobile Technology, Applications, and Systems - Mobility '08, 2008
This paper presents a practical approach to connecting a home network to the IPv6 world. A number of connection methods have been proposed and deployed, some suitable for a rich network environment, e.g. enterprise networks. Home networks are particularly significant due to the large number of sites.
Sinchai Kamolphiwong+2 more
openaire +2 more sources
This paper presents a practical approach to connecting a home network to the IPv6 world. A number of connection methods have been proposed and deployed, some suitable for a rich network environment, e.g. enterprise networks. Home networks are particularly significant due to the large number of sites.
Sinchai Kamolphiwong+2 more
openaire +2 more sources
Improving IPv6 transition management with IPv6 network virtualization
2017 9th International Conference on Advanced Infocomm Technology (ICAIT), 2017We have entered the transitional period between IPv4 and IPv6. However, IPv6 transition management involves entirely new challenges. To tackle these management challenges, we propose a management architecture (VNET6) to improve IPv6 transition manageability.
Ze Luo+4 more
openaire +2 more sources