Results 41 to 50 of about 76,542 (243)

Phase Changes in the Evolution of the IPv4 and IPv6 AS-Level Internet Topologies [PDF]

open access: yes, 2010
In this paper we investigate the evolution of the IPv4 and IPv6 Internet topologies at the autonomous system (AS) level over a long period of time.We provide abundant empirical evidence that there is a phase transition in the growth trend of the two ...
Albert   +25 more
core   +2 more sources

Denial-of-Service Attack Detection over IPv6 Network Based on KNN Algorithm

open access: yesWireless Communications and Mobile Computing, 2021
With the rapid increase and complexity of IPv6 network traffic, the traditional intrusion detection system Snort detects DoS attacks based on specific rules, which reduces the detection performance of IDS.
Yasser Alharbi   +4 more
semanticscholar   +1 more source

ALEX: Improving SIP Support in Systems with Multiple Network Addresses [PDF]

open access: yes, 2005
The successful and increasingly adopted session initiation protocol (SIP) does not adequately support hosts with multiple network addresses, such as dual-stack (IPv4-IPv6) or IPv6 multi-homed devices. This paper presents the Address List Extension (ALEX)
Baldi, Mario   +3 more
core   +1 more source

Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review

open access: yesIEEE Access, 2022
For many reasons, Ethereum attracts more investors, researchers, and even scammers; this is the first platform that enables the new Decentralized Applications (DApps) to run on top of the blockchain network.
Arkan Hammoodi Hasan Kabla   +6 more
doaj   +1 more source

Filtering Network Traffic Based on Protocol Encapsulation Rules [PDF]

open access: yes, 2013
Packet filtering is a technology at the foundation of many traffic analysis tasks. While languages and tools for packet filtering have been available for many years, none of them supports filters operating on the encapsulation relationships found in each
Cerrato, Ivano   +2 more
core   +1 more source

Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)

open access: yesIEEE Access, 2021
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it vulnerable to many types of attacks, such as Router Advertisement (RA ...
Abdullah Ahmed Bahashwan   +4 more
doaj   +1 more source

A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things

open access: yesSensors, 2022
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources
Taief Alaa Al-Amiedy   +5 more
doaj   +1 more source

Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists [PDF]

open access: yesACM/SIGCOMM Internet Measurement Conference, 2018
Network measurements are an important tool in understanding the Internet. Due to the expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6.
Oliver Gasser   +7 more
semanticscholar   +1 more source

A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things

open access: yesIEEE Access, 2023
Message Queuing Telemetry Transport (MQTT) is expected to be the de facto messaging IoT standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant drawback of the MQTT is its lack of protection mechanisms.
Ahmed J. Hintaw   +5 more
doaj   +1 more source

Network layer access control for context-aware IPv6 applications [PDF]

open access: yes, 2003
As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs.
Cheverst, Keith   +5 more
core   +2 more sources

Home - About - Disclaimer - Privacy