Results 41 to 50 of about 76,542 (243)
Phase Changes in the Evolution of the IPv4 and IPv6 AS-Level Internet Topologies [PDF]
In this paper we investigate the evolution of the IPv4 and IPv6 Internet topologies at the autonomous system (AS) level over a long period of time.We provide abundant empirical evidence that there is a phase transition in the growth trend of the two ...
Albert +25 more
core +2 more sources
Denial-of-Service Attack Detection over IPv6 Network Based on KNN Algorithm
With the rapid increase and complexity of IPv6 network traffic, the traditional intrusion detection system Snort detects DoS attacks based on specific rules, which reduces the detection performance of IDS.
Yasser Alharbi +4 more
semanticscholar +1 more source
ALEX: Improving SIP Support in Systems with Multiple Network Addresses [PDF]
The successful and increasingly adopted session initiation protocol (SIP) does not adequately support hosts with multiple network addresses, such as dual-stack (IPv4-IPv6) or IPv6 multi-homed devices. This paper presents the Address List Extension (ALEX)
Baldi, Mario +3 more
core +1 more source
Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review
For many reasons, Ethereum attracts more investors, researchers, and even scammers; this is the first platform that enables the new Decentralized Applications (DApps) to run on top of the blockchain network.
Arkan Hammoodi Hasan Kabla +6 more
doaj +1 more source
Filtering Network Traffic Based on Protocol Encapsulation Rules [PDF]
Packet filtering is a technology at the foundation of many traffic analysis tasks. While languages and tools for packet filtering have been available for many years, none of them supports filters operating on the encapsulation relationships found in each
Cerrato, Ivano +2 more
core +1 more source
Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it vulnerable to many types of attacks, such as Router Advertisement (RA ...
Abdullah Ahmed Bahashwan +4 more
doaj +1 more source
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources
Taief Alaa Al-Amiedy +5 more
doaj +1 more source
Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists [PDF]
Network measurements are an important tool in understanding the Internet. Due to the expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6.
Oliver Gasser +7 more
semanticscholar +1 more source
A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things
Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant drawback of the MQTT is its lack of protection mechanisms.
Ahmed J. Hintaw +5 more
doaj +1 more source
Network layer access control for context-aware IPv6 applications [PDF]
As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs.
Cheverst, Keith +5 more
core +2 more sources

