Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2024
The Potential of Digitalization to Improve the Skills of Agri-Food Market Participants: Technical and Economic Opportunities of Multicasting and Internet Television
Automatic Documentation and Mathematical Linguistics (SPADML), Volume 57, Issue 6Pages 309–332https://doi.org/10.3103/S0005105523060031AbstractThis article deals with the potential of digitalization to improve participants’ skills in the agri-food market. The topic of improving technical mechanisms and software technologies aimed at the qualitative development of e-education in Russia is ...
- research-articleOctober 2022
Saving Brian's privacy: the perils of privacy exposure through reverse DNS
IMC '22: Proceedings of the 22nd ACM Internet Measurement ConferencePages 1–13https://doi.org/10.1145/3517745.3561424Given the importance of privacy, many Internet protocols are nowadays designed with privacy in mind (e.g., using TLS for confidentiality). Foreseeing all privacy issues at the time of protocol design is, however, challenging and may become near ...
- research-articleOctober 2022
Designing Secured Cafe Network with Security Awareness Domain and Resource (SADAR) by Simulation using Cisco Packet Tracer
ICCCM '22: Proceedings of the 10th International Conference on Computer and Communications ManagementPages 233–238https://doi.org/10.1145/3556223.3556258Computer networking has a huge part of life today, which its participation not only in one side of life but in almost all aspects of life, especially in the fields of education, organization and business. The purpose of a computer network related to ...
- research-articleJuly 2022
NetInfra - A Framework for Expressing Network Infrastructure as Code
PEARC '22: Practice and Experience in Advanced Research Computing 2022: Revolutionary: Computing, Connections, YouArticle No.: 17, Pages 1–7https://doi.org/10.1145/3491418.3530762NetInfra is a framework designed to manage both DHCP and DNS services. It does this through single source of truth formatted to be consumed by configuration management software which reduces duplication of efforts and unifies the configuration of these ...
- research-articleOctober 2021
Security analysis of SDN controller-based DHCP services and attack mitigation with DHCPguard
AbstractSoftware defined networking (SDN) presents opportunities for improving network management, mainly thanks to the centralized controller separated from forwarding devices. On the other hand, security in SDN is a complicated issue: SDN ...
-
- rfcJuly 2020
RFC 8801: Discovering Provisioning Domain Names and Data
Provisioning Domains (PvDs) are defined as consistent sets of network configuration information. PvDs allows hosts to manage connections to multiple networks and interfaces simultaneously, such as when a home router provides connectivity through both a ...
- rfcNovember 2018
RFC 8415: Dynamic Host Configuration Protocol for IPv6 (DHCPv6)
This document describes the Dynamic Host Configuration Protocol for IPv6 (DHCPv6): an extensible mechanism for configuring nodes with network configuration parameters, IP addresses, and prefixes. Parameters can be provided statelessly, or in combination ...
- rfcJanuary 2018
RFC 8302: Transparent Interconnection of Lots of Links (TRILL): ARP and Neighbor Discovery (ND) Optimization
This document describes mechanisms to optimize the Address Resolution Protocol (ARP) and Neighbor Discovery (ND) traffic in a Transparent Interconnection of Lots of Links (TRILL) campus. TRILL switches maintain a cache of IP / Media Access Control (MAC) ...
- research-articleMarch 2017
A closer look into DHCP starvation attack in wireless networks
Computers and Security (CSEC), Volume 65, Issue CPages 387–404https://doi.org/10.1016/j.cose.2016.10.002Dynamic Host Configuration Protocol (DHCP) is used by clients in a network to configure their interface with IP address and other network configuration parameters such as Default Gateway and DNS server IP addresses. This protocol is vulnerable to a ...
- rfcMay 2016
RFC 7844: Anonymity Profiles for DHCP Clients
Some DHCP options carry unique identifiers. These identifiers can enable device tracking even if the device administrator takes care of randomizing other potential identifications like link-layer addresses or IPv6 addresses. The anonymity profiles are ...
- rfcOctober 2015
RFC 7653: DHCPv6 Active Leasequery
The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) has been extended with a Leasequery capability that allows a requestor to request information about DHCPv6 bindings. That mechanism is limited to queries for DHCPv6 binding data updates prior to ...
- ArticleApril 2014
User and Device Tracking in Private Networks by Correlating Logs: A System for Responsive Forensic Analysis
CSNT '14: Proceedings of the 2014 Fourth International Conference on Communication Systems and Network TechnologiesPages 1142–1147https://doi.org/10.1109/CSNT.2014.253IP address of a device, from where an offending activity was performed, is of limited value, because it does not specify a physical device/user, but an endpoint in network. It is useful to have information about where a device/user was at the time the ...
- rfcApril 2013
RFC 6925: The DHCPv4 Relay Agent Identifier Sub-Option
This document defines a new Relay Agent Identifier sub-option for the Dynamic Host Configuration Protocol (DHCP) Relay Agent Information option. The sub-option carries a value that uniquely identifies the relay agent device within the administrative ...
- rfcAugust 2012
RFC 6704: Forcerenew Nonce Authentication
Dynamic Host Configuration Protocol (DHCP) FORCERENEW allows for the reconfiguration of a single host by forcing the DHCP client into a Renew state on a trigger from the DHCP server. In the Forcerenew Nonce Authentication protocol, the server sends a ...
- rfcNovember 2011
RFC 6418: Multiple Interfaces and Provisioning Domains Problem Statement
This document describes issues encountered by a node attached to multiple provisioning domains. This node receives configuration information from each of its provisioning domains, where some configuration objects are global to the node and others are ...
- articleNovember 2011
Networking without Dynamic Host Configuration Protocol server in Ethernet and Wireless Local Area Network
Journal of Network and Computer Applications (JNCA), Volume 34, Issue 6Pages 2027–2041https://doi.org/10.1016/j.jnca.2011.07.010A Dynamic Host Configuration Protocol (DHCP) server is a well-known server deployed at a network to manage Internet Protocol (IP) addresses temporarily rentable to hosts in the network. Besides, a DHCP server provides hosts with important network ...
- ArticleSeptember 2011
A Survey of Botnet Size Measurement
ICNDC '11: Proceedings of the 2011 Second International Conference on Networking and Distributed ComputingPages 36–40https://doi.org/10.1109/ICNDC.2011.15Botnet size is one of the most important characteristics to evaluate the threat of botnet. Previous studies of botnet size basically focus on details and concreteness instead of nature of problem due to polymorphic, versatile, complex behavior of botnet ...
- articleDecember 2010
Design and realization of ad-hoc VoIP with embedded p-SIP server
Journal of Systems and Software (JSSO), Volume 83, Issue 12Pages 2536–2555https://doi.org/10.1016/j.jss.2010.07.053In this paper we design and implement the pseudo session initiation protocol (p-SIP) server embedded in each mobile node to provide the ad-hoc voice over Internet protocol (VoIP) services. The implemented p-SIP server, being compatible with common VoIP ...
- rfcOctober 2010
RFC 6011: Session Initiation Protocol (SIP) User Agent Configuration
This document defines procedures for how a SIP User Agent should locate, retrieve, and maintain current configuration information from a Configuration Service. This document is not an Internet Standards Track specification; it is published for ...
- ArticleAugust 2009
A Unified Approach to Intra-domain Security
CSE '09: Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03Pages 219–224https://doi.org/10.1109/CSE.2009.204While a variety of mechanisms have been developed for securing individual intra-domain protocols, none address the issue in a holistic manner. We develop a unified framework to secure prominent networking protocols within a single domain. We begin with ...