Results 21 to 30 of about 14,435 (215)

Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms

open access: yesIEEE Access, 2021
The distributed denial of service (DDoS) attack is one of the most destructive organized cyber-attacks against online services or computers on the network.
Ayman Ghaben   +3 more
doaj   +1 more source

A Review of Scalability Issues in Software-Defined Exchange Point (SDX) Approaches: State-of-the-Art

open access: yesIEEE Access, 2021
Internet Exchange Points (IXPs) interconnect heterogeneous networks and transfer substantial traffic volumes. In the past decade, the number of IXPs has seen tremendous growth, with more operators connecting to these IXPs even though these IXPs faced ...
Abdijalil Abdullahi   +2 more
doaj   +1 more source

IPv6 Security

open access: yesJournal of Physics: Conference Series, 2017
22nd International Conference on Computing in High Energy and Nuclear Physics, CHEP 2016, San Francisco, United States, 10 Oct 2016 - 14 Oct 2016; Journal of physics / Conference Series 898(10), 102008 - (2017).
Babik, M.   +19 more
openaire   +3 more sources

Authentication and Privacy Approach for DHCPv6

open access: yesIEEE Access, 2019
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is used to allocate and distribute IPv6 addresses and network configuration parameters to DHCPv6 clients.
Ayman Al-Ani   +4 more
doaj   +1 more source

Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller–A Review

open access: yesIEEE Access, 2020
The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane from ...
Mohammad A. Aladaileh   +4 more
doaj   +1 more source

Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

open access: yesIEEE Access, 2021
Vehicular ad hoc networks (VANETs) have become increasingly common in the past decades and provides essential and efficient communication for vehicles within intelligent transportation systems. Securing the VANETs wireless communication channel is one of
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

WLCG and IPv6 – the HEPiX IPv6 working group

open access: yesJournal of Physics: Conference Series, 2014
The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG).
Campana, S.   +28 more
openaire   +2 more sources

Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks

open access: yesApplied Sciences, 2022
The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G communication rely heavily on the vehicle’s tamper-proof device (TPD) and roadside units (RSUs ...
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks

open access: yesSensors, 2021
Communications between nodes in Vehicular Ad-Hoc Networks (VANETs) are inherently vulnerable to security attacks, which may mean disruption to the system. Therefore, the security and privacy issues in VANETs are entitled to be the most important.
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)

open access: yesIEEE Access, 2021
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it vulnerable to many types of attacks, such as Router Advertisement (RA ...
Abdullah Ahmed Bahashwan   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy