Security analysis of SDN controller-based DHCP services and attack mitigation with DHCPguard

MS Tok, M Demirci - Computers & Security, 2021 - Elsevier
Software defined networking (SDN) presents opportunities for improving network
management, mainly thanks to the centralized controller separated from forwarding devices …

Ipchain: blockchain-based security protocol for iot address management servers in smart homes

BM Yakubu, MI Khan, P Bhattarakosol - Journal of Sensor and Actuator …, 2022 - mdpi.com
The dynamic host configuration protocol (DHCP) servers are forms of an Internet of Things
(IoT) address management server (IoTAMS) that gives network configuration settings to …

SSL stripping technique (DHCP snooping and ARP spoofing inspection)

HAS Adjei, MT Shunhua, GK Agordzo… - 2021 23rd …, 2021 - ieeexplore.ieee.org
Detecting and preventing network attacks are necessary for network solidity as any
disruption in the network performance resulting from an attack can lead to loss of resources …

The dhcp snooping and dhcp alert method in securing dhcp server from dhcp rogue attack

DA Pradana, AS Budiman - IJID (International Journal on …, 2021 - ejournal.uin-suka.ac.id
DHCP Server as part of the network infrastructure in charge of distributing host
configurations to all devices has the potential to be controlled. If the DHCP Server is …

SDN-Based Cryptographic Client Authentication: A New Approach to DHCP Starvation Mitigation

GC Urama, CC Ukwuoma, MBB Heyat… - … on Innovations in Data …, 2022 - Springer
Network Security has called for more concern with the growing scale of internet usage and
cyberattacks thus making the DHCP (Dynamic Host Configuration Protocol) a vital tool for …

Towards a critical review of cybersecurity risks in anti-poaching systems in South Africa

C Steyn - 2022 - scholar.sun.ac.za
Abstract ENGLISH SUMMARY: Anti-poaching operations increasingly make use of a wide
variety of technology for intelligence and communications. These technologies introduce …

Simulering och analys av attacker riktade mot datalänklagret

M Jemmo, K Laresé - 2022 - diva-portal.org
OSI-modellens lager möjliggör kommunikation mellan nätverksenheter, men de kan också
öppna upp för attacker, eftersom det är svårare att upptäcka attacker mellan lager än …