Authentication and privacy approach for DHCPv6

A Al-Ani, M Anbar, IH Hasbullah, R Abdullah… - IEEE …, 2019 - ieeexplore.ieee.org
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is used to allocate and distribute
IPv6 addresses and network configuration parameters to DHCPv6 clients. Two well-known …

Saving Brian's privacy: the perils of privacy exposure through reverse DNS

O van der Toorn, R van Rijswijk-Deij… - Proceedings of the …, 2022 - dl.acm.org
Given the importance of privacy, many Internet protocols are nowadays designed with
privacy in mind (eg, using TLS for confidentiality). Foreseeing all privacy issues at the time of …

A New Technique to Mitigate DHCPv6 Starvation Attack and Authenticate Clients using DUID

A Jony, MN Islam - … on Advancement in Electrical and Electronic …, 2024 - ieeexplore.ieee.org
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is susceptible to DHCPv6
starvation attack due to the lack of authentication and security mechanisms. RSA …

DHCPv6Auth: A mechanism to improve DHCPv6 authentication and privacy

A Al-Ani, M Anbar, AK Al-Ani, IH Hasbullah - Sādhanā, 2020 - Springer
Abstract Internet Protocol version 6 (IPv6) deployment continues to gain ground due to the
increasing demand for IP addresses generated by the number of Internet facing devices …

Integrating a router based web meter and a software based web meter

SM Rowe - US Patent 8,984,600, 2015 - Google Patents
(57) ABSTRACT A method for associating a web event with a member of a group of users is
implemented at a first computing device. The method includes: receiving a data access …

[PDF][PDF] How Secure is the Next-Generation Internet? An Examination of IPv6.

A Herrera - 2013 - adrianherrera.github.io
The deployment of IPv6-aware networks is expected to increase significantly with the
exhaustion of the IPv4 address space. This report informs those involved in the deployment …

User logging of web traffic on non-browser based devices

SM Rowe - US Patent 9,876,871, 2018 - Google Patents
A method for associating a web event with a member of a group of users is implemented at a
first computing device. The method includes: receiving a data access request from a second …

Proactive threat detection: A DNS based approach

OI van der Toorn - 2022 - research.utwente.nl
The Internet is the cornerstone of our modern civilisation. In an ever connected world, we
work, socialize and play through the Internet. With the Covid-19 pandemic in mind, a life …

Bisers: An Efficient DHCPv6 Bounding Solution

Q Zhang, Y Guo, B Mao, L Zhang… - 2022 IEEE 22nd …, 2022 - ieeexplore.ieee.org
Network scanning is essential to penetration testing, but the IPv6 network is difficult to scan
because of the ample address space. For IPv6 networks managed using DHCPv6, detecting …

Achieving Security and Privacy in the Internet Protocol Version 6 Through the Use of Dynamically Obscured Addresses

MW Dunlop - 2012 - vtechworks.lib.vt.edu
Society's increased use of network applications, such as email, social networking, and web
browsing, creates a massive amount of information floating around in cyber space. An …