Prevention Mechanism Against Denial Of Service Attack On Duplicate Address Detection Process In Ipv6 Link-Local Networks
This thesis aims to introduce a prevention mechanism called DAD-match that comprises three stages, namely, (i) the tentative IP address generation stage, which aims to hide a tentative IP address by using a (cryptographic hash function), (ii) the secure NS and NA messages stage, which aims to secure...
| Main Author: | Ibrahim Al-Ani, Ahmed Khallel |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2020
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/55543/ |
| Abstract | Abstract here |
Similar Items
Anomaly-Based Detection Approach To Detect The Flash Crowd Attack During The Flash Event
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017)
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
Enhanced Trust-nd Protocol To Prevent Temporal Denial-of-service Vulnerabilities On Ipv6 Link-local Network
by: Hasbullah, Iznan Husainy
Published: (2023)
by: Hasbullah, Iznan Husainy
Published: (2023)
An Improved Secure Router Discovery Mechanism To Prevent Fake Ra Attack In Link Local Ipv6 Network
by: C. Arjuman, Navaneethan
Published: (2021)
by: C. Arjuman, Navaneethan
Published: (2021)
A secure RFID model for denial of service attack prevention
by: Farzam Abbasaghababazadeh
Published: (2025)
by: Farzam Abbasaghababazadeh
Published: (2025)
A secure rfid model for denial of service attack prevention
by: Farzam Abbasaghababazadeh
Published: (2025)
by: Farzam Abbasaghababazadeh
Published: (2025)
Timing performance enhance for routing channel in 28NM FPGA chip
by: Kin , Si Kee
Published: (2013)
by: Kin , Si Kee
Published: (2013)
Hybrid dynamic phase alignment scheme to improve sampling resolution for 1.25 gHz source synchronous interface
by: Lim , Kok Chean
Published: (2013)
by: Lim , Kok Chean
Published: (2013)
QYPS HPS Interconnect verification methodology for SOC FPGA
by: Loh , Tat Jen
Published: (2013)
by: Loh , Tat Jen
Published: (2013)
Design method to transmit and receive source synchronous signals using source asynchronous
by: Ramachandran, Nathan
Published: (2013)
by: Ramachandran, Nathan
Published: (2013)
An expansionary approach for the allocation of next generation ipv6 internet addresses.
by: Murugesan, Raja Kumar
Published: (2011)
by: Murugesan, Raja Kumar
Published: (2011)
Enhanced cryptographically generated address (CGA) algorithms for mobile IPV6
by: Qadir, Sana
Published: (2024)
by: Qadir, Sana
Published: (2024)
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
by: Rastegari, Samaneh
Published: (2009)
by: Rastegari, Samaneh
Published: (2009)
Detection of Denial of Service (DoS) Attacks in Local Area Networks Based on Outgoing Packets
by: Manaa, Mehdi Ebady
Published: (2012)
by: Manaa, Mehdi Ebady
Published: (2012)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
by: Malekzadeh, Mina
Published: (2011)
by: Malekzadeh, Mina
Published: (2011)
A cryptographic one-to-many reversible mapping for IPv6 address generation and identification in enterprise WLANs
by: Hakiem, Nashrul
Published: (2024)
by: Hakiem, Nashrul
Published: (2024)
Modeling and analysis of wireless inductive power transfer link
by: Nataraj, Chandrasekharan
Published: (2024)
by: Nataraj, Chandrasekharan
Published: (2024)
A comprehensive study of distributed denial of service attack with the detection techniques
by: Ibrahim, Husam Hamid
Published: (2018)
by: Ibrahim, Husam Hamid
Published: (2018)
A comprehensive study of distributed denial of service attack with the detection techniques
by: Ibrahim, Husam Hamid
Published: (2018)
by: Ibrahim, Husam Hamid
Published: (2018)
FinFet-based 6-T SRAM circuit modeling and RC delay analysis using hspice
by: Lim, Wei
Published: (2025)
by: Lim, Wei
Published: (2025)
Effects of shadowing on LoRa LPWAN links /by Israth Jahan Chowdhury
by: Chowdhury, Israth Jahan
Published: (2024)
by: Chowdhury, Israth Jahan
Published: (2024)
Identification IPV6 security features and securty comparsion between IPV4 and IPV6
by: Omar Ahmed Abdelsalam
Published: (2025)
by: Omar Ahmed Abdelsalam
Published: (2025)
Implementation of Data Transmission Using X-10 Protocol within Household Wiring
by: Tan, Lay Khim
Published: (2007)
by: Tan, Lay Khim
Published: (2007)
A generation of transmitter signal for 16 PSK STBC memo on FPGA based polarizone testbed / Mohd Naim Ab Kassim
by: Ab Kassim, Mohd Naim
Published: (2014)
by: Ab Kassim, Mohd Naim
Published: (2014)
Sistem analisa rangkaian telekomunikasi
by: Noor Azlan Shah Abu Bakar
Published: (2025)
by: Noor Azlan Shah Abu Bakar
Published: (2025)
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
by: Izaddoost, Alireza
Published: (2008)
by: Izaddoost, Alireza
Published: (2008)
Collaborative detection and mitigation of distributed denial-of-service attacks in software-defined networks
by: Omer Elsier Tayfour
Published: (2025)
by: Omer Elsier Tayfour
Published: (2025)
An intrusion detection system for DDoS flooding attacks on IPv6 networks using deep learning techniques
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
Wireless Power Transmission-exploring source to load inductive link performance under resonance and varying load conditions
by: Ahmed, Khandker Jamil
Published: (2024)
by: Ahmed, Khandker Jamil
Published: (2024)
Evaluation of IPv4 and IPv6 in Testbed Performance
by: Daw, Daw Abdulsalam Ali
Published: (2009)
by: Daw, Daw Abdulsalam Ali
Published: (2009)
Enhancement of IP trace back packet marking algorithm to detect denial of service attack
by: Saleem, Habibullah
Published: (2024)
by: Saleem, Habibullah
Published: (2024)
A robust image watermarking technique based on Cox 's DCT to against rotation attack
by: Seyed Mohamad Bagher Shafieinasab Langeroudi
Published: (2025)
by: Seyed Mohamad Bagher Shafieinasab Langeroudi
Published: (2025)
Efficient beamforming and spectral efficiency maximization in a joint transmission LTE-A system
by: Faisal, Ali Raed
Published: (2016)
by: Faisal, Ali Raed
Published: (2016)
Design and analysis of axial mode helical antenna for underwater communication systems at 433 mhz in freshwater environments
by: Jaafar, Afiza Nur
Published: (2025)
by: Jaafar, Afiza Nur
Published: (2025)
Block diagonalization precoding for multiuser-MIMO downlink channel / Nur Asniffah Mat Zain
by: Mat Zain, Nur Asniffah
Published: (2015)
by: Mat Zain, Nur Asniffah
Published: (2015)
An experiment in X.25 datagram implementation for a personal computer (Fulltext)
Published: (2025)
Published: (2025)
Performance Evaluation Of IPSec Implementation In IPV4 And IPV6 Networks
by: Norshakinah, Md Nasir
Published: (2007)
by: Norshakinah, Md Nasir
Published: (2007)
An enhanced approach for record duplication deduction with a-tree and non-transposition Jaro-Winkler
by: Saleh Rehiel A. Alenazi (P78194)
Published: (2023)
by: Saleh Rehiel A. Alenazi (P78194)
Published: (2023)
Protection of XML denial-of-service and flooding attacks in soap-based web services using middleware tool
by: Abbas Ahmed Ali Qassem Al-Asri (P83728)
Published: (2023)
by: Abbas Ahmed Ali Qassem Al-Asri (P83728)
Published: (2023)
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
by: Fatin Norsyafawati, Mohd Sabri
Published: (2024)
by: Fatin Norsyafawati, Mohd Sabri
Published: (2024)
Similar Items
-
Anomaly-Based Detection Approach To Detect The Flash Crowd Attack During The Flash Event
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017) -
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017) -
Enhanced Trust-nd Protocol To Prevent Temporal Denial-of-service Vulnerabilities On Ipv6 Link-local Network
by: Hasbullah, Iznan Husainy
Published: (2023) -
An Improved Secure Router Discovery Mechanism To Prevent Fake Ra Attack In Link Local Ipv6 Network
by: C. Arjuman, Navaneethan
Published: (2021) -
A secure RFID model for denial of service attack prevention
by: Farzam Abbasaghababazadeh
Published: (2025)
