A Study of Two Different Attacks to IPv6 Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2017, Vol 19, Issue 5
Abstract
In the lights of today and future advancing technologies, the demand of IPv6 internet protocol, had becomes crucial for its usages & benefits. This paper investigates the use of information messages to build a visual perception and follow-up of IPv6-based cyber-attacks on IPv6 networks IPv6 , (DOS)& ARP poisoning , Packet analyzer( wireshark ) and open source tools( virtualbox, Linux kali system, Ubuntu Linux server ) are used ,to verify the existence of attacks on IPV6. The experimental results ,proved that the traces of simulated attacks extend form the link layer to the application layer.
Authors and Affiliations
Ayman M. A. Shabour, M. A. Elshaikh
Using Daub achy Wavelet for Shot Boundary Detection
Abstract: SHOT Boundary Detection Is A Fundamental Step In Most Video Processing And Manipulation Applications. With The Wide Spread Of Video Usage Nowadays, The Rise For Automated Video Shot Boundary Detection Bec...
PageRank algorithm and its variations: A Survey report
This survey report basically gives a comparison report on different page ranking algorithm on the basis of numerical analysis. Four popular algorithms used for this purpose PageRank, Weighted PageRank, PageRank...
Framework of Security Mechanisms for Monitoring Adaptive Distributed Systems
Abstract: The distributed systems have a noteworthy role in today’s information technology, whether it is governmental or nongovernmental organizations. The major concern of today’s software industry is that dealing with...
A Knowledge-Based HIV/AIDS Framework for Lagos State: AnEmpirical Study
Abstract: This study investigates non-clinical HIV/AIDS activities and explores the efficacy of contemporary EHealthinitiatives, including systems focusing on deployment of healthcare information, telecommunications andi...
Automatic DNA Sequence Generation for Secured Effective Multi -Cloud Storage
The main target of this paper is to propose an algorithm to implement data hiding in DNA sequences to increase the confidentiality and complexity by using software point of view in cloud computing environments. &...