K Sinha, A Tripathi, N Agarwal - 2021 6th International …, 2021 - ieeexplore.ieee.org
With the underlying IPv6 network of the differential computing system, there are differences within the network. The security detection has various blind zone. The difference of the …
Y Liu, JP Wu, Z Zhang, K Xu - Science China Information Sciences, 2013 - Springer
Despite the great success achieved by the Internet, it has been facing increasingly severe technical challenges that include address exhaustion, low-level network security and …
H Shuai, H Xiaohong, M Yan - 2010 IEEE Globecom …, 2010 - ieeexplore.ieee.org
The addressing and forwarding architecture based on the destination of packets in current Internet typically does not check the authenticity of source address of packets; therefore, it …
E Nordmark, M Bagnulo, E Levy-Abegnoli - 2012 - dl.acm.org
This memo describes First-Come, First-Served Source Address Validation Improvement (FCFS SAVI), a mechanism that provides source address validation for IPv6 networks using …
JM Combes, M Laurent - SSTIC 2012: Symposium sur la Sécurité des …, 2012 - hal.science
Il y a une dizaine d'années, suite à une forte augmentation d'attaques utilisant des adresses IP source falsifiées, l'IETF standardisait la technique de" Network Ingress Filtering", ainsi que …
10 IX September 2022 https://doi.org/10.22214/ijraset.2022.46628 Page 1 10 IX September 2022 https://doi.org/10.22214/ijraset.2022.46628 Page 2 International Journal for Research in …
In dieser Arbeit werden die Bedrohungen für ein lokales IPv6 Netzwerk, mit besonderem Hinblick auf das neu eingeführte Neighbor Discovery Protocol (NDP), analysiert. Dabei wird …
The document describes a proxy-based mechanism allowing the use of Duplicate Address Detection (DAD) by IPv6 nodes in a point-to-multipoint architecture with a" split-horizon" …
We propose an integrated approach to protect from address spoofing for both IPv6 and Layer-2 addresses, and from address resolution attacks. The proposed approach is an …