Programmable data planes allow users to define their own data plane algorithms for network devices including appropriate data plane application programming interfaces (APIs) which …
The emergence of the IoT, cloud systems, data centers, and 5G networks is increasing the demand for a rapid development of new applications and protocols at all levels of the …
Y Gao, Z Wang - Mobile Information Systems, 2021 - Wiley Online Library
Network attacks show a trend of increased attack intensity, enhanced diversity, and more concealed attack methods, which put forward higher requirements for the performance of …
X Chen, C Wu, X Liu, Q Huang, D Zhang… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
With the growth of network applications such as 5G and artificial intelligence, network security techniques, ie, the techniques that detect various attacks (eg, well-known denial-of …
Abstract Duplicate Address Detection is the protocol that confirms the uniqueness of an IPv6 host′ s identification when it joins a new network. DAD scheme is susceptible to neighbor …
L He, P Kuang, Y Liu, G Ren, J Yang - Computer Networks, 2021 - Elsevier
Abstract Duplicate Address Detection (DAD) is one of the functions of the Neighbor Discovery Protocol (NDP), which determines whether the IPv6 address of a node conflicts …
Y Li, W Yang, Z Zhou, Q Liu, Z Li… - ICC 2022-IEEE …, 2022 - ieeexplore.ieee.org
Internet Protocol Version 6 (IPv6) is expected for widespread deployment worldwide. Such rapid development of IPv6 may lead to safety problems. The main threats in IPv6 networks …
M Mönnich, NS Bülbül, D Ergenç… - Proceedings of the …, 2021 - dl.acm.org
The IPv6 protocol will sooner or later replace IPv4 to cope with an exponentially increasing number of connected devices. Some of the most significant functions of IPv6 networks are …
J Cao, Y Liu, M Liu, L He, Y Jia… - 2021 IEEE/ACM 29th …, 2021 - ieeexplore.ieee.org
Source IP address spoofing has been a major vulnerability of the Internet for many years. Although much work has been done to study the problem extensively, spoofing continues to …