Security analysis of SDN controller-based DHCP services and attack mitigation with DHCPguard
Software defined networking (SDN) presents opportunities for improving network
management, mainly thanks to the centralized controller separated from forwarding devices …
management, mainly thanks to the centralized controller separated from forwarding devices …
SECS/GEMsec: A mechanism for detection and prevention of cyber-attacks on SECS/GEM communications in industry 4.0 landscape
SUA Laghari, S Manickam, AK Al-Ani… - Ieee …, 2021 - ieeexplore.ieee.org
Industry 4.0 as a driving force is making huge strides, particularly in the manufacturing
sector, where all integral components involved in the production processes are getting …
sector, where all integral components involved in the production processes are getting …
Flow-based approach to detect abnormal behavior in neighbor discovery protocol (NDP)
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …
Ipchain: blockchain-based security protocol for iot address management servers in smart homes
BM Yakubu, MI Khan, P Bhattarakosol - Journal of Sensor and Actuator …, 2022 - mdpi.com
The dynamic host configuration protocol (DHCP) servers are forms of an Internet of Things
(IoT) address management server (IoTAMS) that gives network configuration settings to …
(IoT) address management server (IoTAMS) that gives network configuration settings to …
Ndpsec: neighbor discovery protocol security mechanism
Internet Protocol version 6 (IPv6) is envisioned as the cornerstone for future internet
connectivity and information technology (IT) expansion. Due to its enormous address pool …
connectivity and information technology (IT) expansion. Due to its enormous address pool …
Adaptive 3D Reversible Data Hiding Technique Based on the Cumulative Peak Bins in the Histogram of Directional Prediction Error
Reversible data hiding (RDH) is crucial in modern data security, ensuring confidentiality and
tamper-proofness in various industries like copyright protection, medical imaging, and digital …
tamper-proofness in various industries like copyright protection, medical imaging, and digital …
[HTML][HTML] Optimized reversible data hiding technique based on multidirectional prediction error histogram and fluctuation-based adaptation
D Kasasbeh, M Anbar - Journal of King Saud University-Computer and …, 2024 - Elsevier
Abstract Reversible Data Hiding Techniques (RDH) play an increasingly pivotal role in the
field of cybersecurity. Overlooking the properties of the carrier image and neglecting the …
field of cybersecurity. Overlooking the properties of the carrier image and neglecting the …
A New Technique to Mitigate DHCPv6 Starvation Attack and Authenticate Clients using DUID
A Jony, MN Islam - … on Advancement in Electrical and Electronic …, 2024 - ieeexplore.ieee.org
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is susceptible to DHCPv6
starvation attack due to the lack of authentication and security mechanisms. RSA …
starvation attack due to the lack of authentication and security mechanisms. RSA …
Propose a flow-based approach for detecting abnormal behavior in neighbor discovery protocol (NDP)
AA Bahashwan, M Anbar, S Manickam… - … on Advances in Cyber …, 2021 - Springer
Abstract Neighbour Discovery Protocol is vulnerable to various attacks, such as DoS
flooding attack that uses excessive amount of Router Advertisement (RA) and Neighbour …
flooding attack that uses excessive amount of Router Advertisement (RA) and Neighbour …
DHCP DoS and starvation attacks on SDN controllers and their mitigation
Abstract Software Defined Networking (SDN) technology offers possibilities to improve
network administration through a separate central controller for network switching devices …
network administration through a separate central controller for network switching devices …