Showing 41 - 60 results of 319 for search '"IP address"', query time: 0.10s Refine Results
  1. 41

    Prevention Mechanism Against Denial Of Service Attack On Duplicate Address Detection Process In Ipv6 Link-Local Networks by Ibrahim Al-Ani, Ahmed Khallel

    Published 2020
    “…This thesis aims to introduce a prevention mechanism called DAD-match that comprises three stages, namely, (i) the tentative IP address generation stage, which aims to hide a tentative IP address by using a (cryptographic hash function), (ii) the secure NS and NA messages stage, which aims to secure NS and NA messages by using the NDP experimental option and (iii) the DoS on DAD prevention stage, which aims to prevent a DoS attack during the DAD process by designing a rule-based mechanism. …”
    Get full text
    Thesis
  2. 42

    Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli by Rosli, Mohamad AfiqHakimi

    Published 2019
    “…Going well also is the internet connectivity test while connected to VPN and Tor service, where the internet connectivity is not enough stable when the client’s IP address changed to another IP address. Lastly, the used of combination VPN and Tor service inside local area network can be concluded that it is secure and suitable to use to secure the information as well as the data packet travel over the internet but does not suggest for user who wants a good internet connectivity.…”
    Get full text
    Thesis
  3. 43

    Spamming Forensic Analysis Using Network Forensics Development Life Cycle Method by Imam Riadi, Sunardi Sunardi, Fitriyani Tella Fitri

    Published 2022-02-01
    “…The parameter is the IP address of the sender or spammer found is 72.125.68.109, the victim's IP address is 192.168.1.12.…”
    Get full text
    Article
  4. 44

    Layered Botnet Detection Framework Based On Signal Processing And Discrete Time Analysis by Melhim, Loai Kayed Hassan Bani

    Published 2012
    “…Thus the IP address of PCs with periodic behavior will be saved in a database and labeled as suspicious. …”
    Get full text
    Thesis
  5. 45

    A traffic signature-based algorithm for detecting scanning internet worms by M. Rasheed, Mohammad, Ghazali, Osman, Md Norwawi, Norita, M. Kadhum, Mohammed

    Published 2009
    “…In order to reduce the number of false alarm, the impact of normal network activities is involved but TCP failure and ICMP unreachable connection on same IP address are not calculated because the internet worm strategic attack on the different IP address. …”
    Get full text
    Article
  6. 46

    Secure and Lightweight Subflow Establishment of Multipath-TCP by Gunhee Noh, Hoorin Park, Heejun Roh, Wonjun Lee

    Published 2019-01-01
    “…Each network interface with an IP address is called as a subflow. A subflow is a TCP connection which can have a different internet path identified by IP addresses of source and destination network interfaces. …”
    Get full text
    Article
  7. 47

    Effective DGA-Domain Detection and Classification with TextCNN and Additional Features by Chanwoong Hwang, Hyosik Kim, Hooki Lee, Taejin Lee

    Published 2020-06-01
    “…The system infected by the malicious code tries to communicate with the C&C server through the IP address or domain address of the C&C server. If the IP address or domain address is hard-coded inside the malicious code, it can analyze the malicious code to obtain the address and block access to the C&C server through security policy. …”
    Get full text
    Article
  8. 48

    Development of a secure video chat based on the WebRTC standard for video conferencing by Revyakina Elena

    Published 2023-01-01
    “…As a result of the analytical review, the shortcomings of the WebRTC technology were revealed - disclosure of the private IP address of the system user. Therefore, an application architecture was proposed that solves this problem. …”
    Get full text
    Article
  9. 49

    The Westermo network traffic data set by Per Erik Strandberg, David Söderman, Alireza Dehlaghi-Ghadim, Miguel Leon, Tijana Markovic, Sasikumar Punnekkat, Mahshid Helali Moghadam, David Buffoni

    Published 2023-10-01
    “…The data set contains six types of events: harmless SSH, bad SSH, misconfigured IP address, duplicated IP address, port scan, and man in the middle attack.…”
    Get full text
    Article
  10. 50

    Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection by Omar E. Elejla, Mohammed Anbar, Shady Hamouda, Bahari Belaton, Taief Alaa Al-Amiedy, Iznan H. Hasbullah

    Published 2022-12-01
    “…The flow consists of packets with similar attributes (i.e., packets with the same source and destination IP address) and features that can differentiate between normal and malicious traffic behavior, such as the source IP address’s symmetry and the whole flow’s symmetry. …”
    Get full text
    Article
  11. 51

    Analisis Forensik pada Web Phishing Menggunakan Metode National Institute Of Standards And Technology (NIST) by Agil Nofiyan, Mushlihudin Mushlihudin

    Published 2020-06-01
    “…Penelitian ini menganalisis serangan web phishing oleh phiser menggunakan fitur fake login dan didapatkan file capture wireshark dari web phishing dengan protocols HTTPS serta hasil analisis dari pendekripsian pada keamanan yang terdapat pada protocols HTTPS berupa URL phishing, DNS (Domain Name System) yang digunakan oleh pelaku, IP address server, IP address destination, identitas penyerang dan email dari informasi tindak kejahatan yang dilakukan phiser untuk mendapatkan account valid milik korbannya.…”
    Get full text
    Article
  12. 52

    IoT Network Cybersecurity Assessment With the Associated Random Neural Network by Erol Gelenbe, Mert Nakip

    Published 2023-01-01
    “…This paper proposes a method to assess the security of an <inline-formula> <tex-math notation="LaTeX">$n$ </tex-math></inline-formula> device, or IP address, IoT network by simultaneously identifying all the compromised IoT devices and IP addresses. …”
    Get full text
    Article
  13. 53

    Optimal forwarding routing protocol in ipv6-based wireless sensor network by Jamil, Ansar

    Published 2009
    “…It is because numerous sensor nodes is not practical for each one of them to be assigned with unique IP address due to limited IP address available in IPv4. …”
    Get full text
    Thesis
  14. 54

    DATA PROTECTION TECHNOLOGIES IN THE DISTANCE LEARNING SYSTEMS by Inna V. Herasymenko

    Published 2015-06-01
    “…There are analyzed key places that require protection and suggested possible options for their protection, such as the use of CAPTCHA for registration, protection for the IP-address and service of copy protection. Testing of the proposed security tools was piloted in terms of e-learning course "Information Technologies of Systems Analysis".…”
    Get full text
    Article
  15. 55

    PEMANFAATAN NOTIFIKASI TELEGRAM UNTUK MONITORING JARINGAN by Febriyanti Panjaitan, Rusmin Syafari

    Published 2019-11-01
    “…Pengujian Serangan dilakukan dengan beberapa teknik yaiu FTP Bruteforce Attack, Ddos Attack, dan SSH Bruteforce Attack   sehingga didapat sumber serangan berasal dari IP Address Luar dengan target IP Address server pada port 21, port 80, port 22 serta mendapatkan username “root”  dan password “rockyou.txt” menggunakan aplikasi Hping3 dan Hydra. …”
    Get full text
    Article
  16. 56

    Design of a microgrid energy management system featuring an economic dispatch module and a SCADA interface for real-time data acquisition: phase II by Chee, Sin Hwee

    Published 2022
    “…In addition, due to a recent network upgrade in the lab, the internet protocol (IP) addresses of the devices and assets have been changed and the IP address of WAGO's Programmable Logic Controllers (PLCs) could not be updated. …”
    Get full text
    Final Year Project (FYP)
  17. 57

    Studi Unjuk Kerja Jaringan Komputer RSUD Saras Husada Kabupaten Purworejo Jawa Tengah by , BILLY LUKMANFIANDY, , Ir. P. Insap Santosa, M.Sc., Ph.D.

    Published 2013
    “…They were analysis of the existing topology, IP address allocation analysis, media analysis, identification of network problems, and computer network traffic analysis. …”
    Thesis
  18. 58

    MOBILE IP by , SISWANTO, , Alif Subardono, S.T., M.Eng.

    Published 2014
    “…Mobile IP is a technology that can perform the function not to change IP address while moving from one network to another network. …”
    Thesis
  19. 59

    Analisis Forensik Jaringan Studi Kasus Serangan SQL Injection pada Server Universitas Gadjah Mada by Resi Utami Putri, Jazi Eko Istiyanto

    Published 2013-07-01
    “…Based on the research, there are 68 IP address was that did illegal action, SQL injection, on server www.ugm.ac.id. …”
    Get full text
    Article
  20. 60

    PEMBUATAN SYSTEM CORPORATE MESSENGER PADA JARINGAN LAN by Lily Puspa Dewi, Remuz MB Kmurawak, Petrus Santoso

    Published 2008-01-01
    “…Audio and video message sending can be done with peer to peer connection with entering the IP address first from remote user that we want to communicate with. …”
    Get full text
    Article