Security analysis of SDN controller-based DHCP services and attack mitigation with DHCPguard

MS Tok, M Demirci - Computers & Security, 2021 - Elsevier
Software defined networking (SDN) presents opportunities for improving network
management, mainly thanks to the centralized controller separated from forwarding devices …

SECS/GEMsec: A mechanism for detection and prevention of cyber-attacks on SECS/GEM communications in industry 4.0 landscape

SUA Laghari, S Manickam, AK Al-Ani… - Ieee …, 2021 - ieeexplore.ieee.org
Industry 4.0 as a driving force is making huge strides, particularly in the manufacturing
sector, where all integral components involved in the production processes are getting …

Flow-based approach to detect abnormal behavior in neighbor discovery protocol (NDP)

AA Bahashwan, M Anbar, IH Hasbullah… - IEEE …, 2021 - ieeexplore.ieee.org
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …

Ipchain: blockchain-based security protocol for iot address management servers in smart homes

BM Yakubu, MI Khan, P Bhattarakosol - Journal of Sensor and Actuator …, 2022 - mdpi.com
The dynamic host configuration protocol (DHCP) servers are forms of an Internet of Things
(IoT) address management server (IoTAMS) that gives network configuration settings to …

Ndpsec: neighbor discovery protocol security mechanism

A Al-Ani, AK Al-Ani, SA Laghari, S Manickam… - IEEE …, 2022 - ieeexplore.ieee.org
Internet Protocol version 6 (IPv6) is envisioned as the cornerstone for future internet
connectivity and information technology (IT) expansion. Due to its enormous address pool …

Adaptive 3D Reversible Data Hiding Technique Based on the Cumulative Peak Bins in the Histogram of Directional Prediction Error

D Kasasbeh, M Anbar, G Issa, BA Alabsi, SDA Rihan - Electronics, 2023 - mdpi.com
Reversible data hiding (RDH) is crucial in modern data security, ensuring confidentiality and
tamper-proofness in various industries like copyright protection, medical imaging, and digital …

[HTML][HTML] Optimized reversible data hiding technique based on multidirectional prediction error histogram and fluctuation-based adaptation

D Kasasbeh, M Anbar - Journal of King Saud University-Computer and …, 2024 - Elsevier
Abstract Reversible Data Hiding Techniques (RDH) play an increasingly pivotal role in the
field of cybersecurity. Overlooking the properties of the carrier image and neglecting the …

A New Technique to Mitigate DHCPv6 Starvation Attack and Authenticate Clients using DUID

A Jony, MN Islam - … on Advancement in Electrical and Electronic …, 2024 - ieeexplore.ieee.org
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is susceptible to DHCPv6
starvation attack due to the lack of authentication and security mechanisms. RSA …

Propose a flow-based approach for detecting abnormal behavior in neighbor discovery protocol (NDP)

AA Bahashwan, M Anbar, S Manickam… - … on Advances in Cyber …, 2021 - Springer
Abstract Neighbour Discovery Protocol is vulnerable to various attacks, such as DoS
flooding attack that uses excessive amount of Router Advertisement (RA) and Neighbour …

DHCP DoS and starvation attacks on SDN controllers and their mitigation

HU Ishtiaq, AA Bhutta, AN Mian - Journal of Computer Virology and …, 2024 - Springer
Abstract Software Defined Networking (SDN) technology offers possibilities to improve
network administration through a separate central controller for network switching devices …