Results 21 to 30 of about 76,542 (243)

6GAN: IPv6 Multi-Pattern Target Generation via Generative Adversarial Nets with Reinforcement Learning [PDF]

open access: yesIEEE Conference on Computer Communications, 2021
Global IPv6 scanning has always been a challenge for researchers because of the limited network speed and computational power. Target generation algorithms are recently proposed to overcome the problem for Internet assessments by predicting a candidate ...
Tianyu Cui   +5 more
semanticscholar   +1 more source

Challenges and Mitigation Strategies for Transition from IPv4 Network to Virtualized Next-Generation IPv6 Network

open access: yes˜The œinternational Arab journal of information technology, 2023
The rapid proliferation of the Internet has exhausted Internet Protocol version 4 (IPv4) addresses offered by Internet Assigned Number Authority (IANA). The new version of the IP i.e.
Z. Ashraf   +4 more
semanticscholar   +1 more source

Follow the scent: defeating IPv6 prefix rotation privacy [PDF]

open access: yesACM/SIGCOMM Internet Measurement Conference, 2021
IPv6's large address space allows ample freedom for choosing and assigning addresses. To improve client privacy and resist IP-based tracking, standardized techniques leverage this large address space, including privacy extensions and provider prefix ...
Erik C. Rye, Robert Beverly, K. Claffy
semanticscholar   +1 more source

Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review

open access: yesApplied Sciences, 2023
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security ...
Tariq Emad Ali   +2 more
doaj   +1 more source

ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK [PDF]

open access: yesActa Electrotechnica et Informatica, 2021
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end
Cyril Filip KOVACIK, Gabriel BUGAR
doaj   +1 more source

A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks

open access: yesSensors, 2022
Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on roadside units to offer conditional privacy-preservation authentication and are vulnerable to insider attacks.
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking

open access: yesSensors, 2023
Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, including flexibility and manageability.
Abdullah Ahmed Bahashwan   +5 more
doaj   +1 more source

Evaluación del Rendimiento de una red IPv6 utilizando IPSec en Modo Túnel

open access: yesInformática y Sistemas, 2023
El espacio de direcciones IPv4 está a punto de llegar a su límite y podría colapsar, para corregir este evento muchos proponen que las redes existentes deberán realizar la migración definitiva a IPv6, tomando como referencia que este protocolo permitirá ...
Yumber Alejandro Ponce Loor   +1 more
doaj   +1 more source

Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks

open access: yesApplied Sciences, 2022
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control Message Protocol version six (ICMPv6), an essential protocol to the IPv6 ...
Omar E. Elejla   +5 more
semanticscholar   +1 more source

Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms

open access: yesIEEE Access, 2021
The distributed denial of service (DDoS) attack is one of the most destructive organized cyber-attacks against online services or computers on the network.
Ayman Ghaben   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy