scholarly journals RObust Header Compression (ROHC): Profiles for User Datagram Protocol (UDP) Lite

Author(s):  
G. Pelletier
2004 ◽  
Vol 23 (5-6) ◽  
pp. 785-815
Author(s):  
Ana Minaburo ◽  
Laurent Toutain
Keyword(s):  

2020 ◽  
Author(s):  
T. Vedavathi ◽  
R Karthick ◽  
Senthamil Selvan Raja ◽  
Meenalochini P

Author(s):  
Aleksander Malinowski ◽  
Bogdan Wilamowski

2007 ◽  
Author(s):  
◽  
K. Sandlund ◽  
G. Pelletier ◽  
P. Kremer
Keyword(s):  

2017 ◽  
Vol 9 (1-4) ◽  
Author(s):  
Athirah Rosli ◽  
Abidah Mat Taib ◽  
Wan Nor Ashiqin Wan Ali

Escalation of Internet-of-Thing (IoT) may cause internet users being exposed to IPv6 security issues. End-to-end connection feature in IPv6 can be misused by attackers to flood targeted host. Using User Datagram Protocol (UDP), attackers can certainly congest the network by injecting UDP packets during network communication. This will introduce risk if there is no precaution step taken. Enhanced risk assessment equation can be adopted to mitigate the perils. Thus, this paper presents the use of enhanced risk assessment equation to identify risk value that is caused by UDP flooding attack. The attack was simulated using OMNeT++ simulation software. The inputs that were considered in the enhanced equation are based on the features of the tested network scenarios. The obtained risk value can be used in determining appropriate mitigation techniques that help the organization in maintaining and strengthening their network. It also offers organization to secure their network resources and assets. Furthermore, this paper also reveals that the enhanced risk assessment equation is flexible to be used in any situation. Hereafter, more IPv6 based protocols will be tested to measure the capability of using the enhanced equation. 


Sign in / Sign up

Export Citation Format

Share Document