Search Results - "Hasbullah, Iznan H"
-
1
A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking
Published in Sensors (Basel, Switzerland) (01-05-2023)“…Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, including flexibility and manageability…”
Get full text
Journal Article -
2
A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks
Published in Sensors (Basel, Switzerland) (22-02-2022)“…Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on roadside units to offer conditional privacy-preservation authentication…”
Get full text
Journal Article -
3
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks
Published in Sensors (Basel, Switzerland) (08-12-2021)“…Communications between nodes in Vehicular Ad-Hoc Networks (VANETs) are inherently vulnerable to security attacks, which may mean disruption to the system…”
Get full text
Journal Article -
4
A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things
Published in Sensors (Basel, Switzerland) (29-04-2022)“…The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate…”
Get full text
Journal Article -
5
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network
Published in Symmetry (Basel) (01-10-2020)“…The security and privacy issues in vehicular ad hoc networks (VANETs) are often addressed with schemes based on either public key infrastructure, group…”
Get full text
Journal Article -
6
Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates
Published in Applied sciences (01-06-2022)“…The increasing incidence of distributed denial-of-service (DDoS) attacks has made software-defined networking (SDN) more vulnerable to the depletion of…”
Get full text
Journal Article -
7
Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks
Published in Applied sciences (01-02-2022)“…The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G…”
Get full text
Journal Article -
8
Distributed Denial of Service Attacks against Cloud Computing Environment: Survey, Issues, Challenges and Coherent Taxonomy
Published in Applied sciences (01-12-2022)“…Cloud computing (CC) plays a significant role in revolutionizing the information and communication technology (ICT) industry, allowing flexible delivery of new…”
Get full text
Journal Article -
9
Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks
Published in Applied sciences (01-06-2022)“…Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol version four (IPv4). IPv6 introduces several new protocols, such as…”
Get full text
Journal Article -
10
Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review
Published in IEEE access (01-01-2020)“…The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined…”
Get full text
Journal Article -
11
Effectiveness of an Entropy-Based Approach for Detecting Low- and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis
Published in Applied sciences (01-01-2023)“…Software-defined networking (SDN) is a unique network architecture isolating the network control plane from the data plane, offering programmable elastic…”
Get full text
Journal Article -
12
Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection
Published in Symmetry (Basel) (01-12-2022)“…Internet Protocol version 6 (IPv6) and its core protocol, Internet Control Message Protocol version 6 (ICMPv6), need to be secured from attacks, such as Denial…”
Get full text
Journal Article -
13
Performance Analysis of Internet Key Exchange Algorithms on IPSec Security Association Initiation
Published in MATEC Web of Conferences (01-01-2018)“…Naturally, the Internet as an open network allows millions of users to interact each other. Furthermore, the giant network vulnerable to various malicious…”
Get full text
Journal Article Conference Proceeding -
14
Neighbor discovery protocol anomaly-based detection system using neural network algorithm
Published in International journal of information security (01-06-2024)“…The exponential increase in Internet-facing devices in the last decade has resulted in IP address exhaustion due to the limitations of the existing IPv4…”
Get full text
Journal Article -
15
IMPLEMENTATION OF TRUST NEIGHBOR DISCOVERY ON SECURING IPv6 LINK LOCAL COMMUNICATION
Published in Journal of engineering science & technology (01-09-2018)“…Neighbour Discovery Protocol is a core IPv6 protocol used within the local network to provide functionalities such as Router Discovery and Neighbour Discovery…”
Get full text
Journal Article -
16
Review of Prevention schemes for Replay Attack in Vehicular Ad hoc Networks (VANETs)
Published in 2020 IEEE 3rd International Conference on Information Communication and Signal Processing (ICICSP) (01-09-2020)“…Vehicular Ad hoc Networks (VANETs) are self-organizing wireless communication networks that allow vehicles to exchange traffic-related messages automatically…”
Get full text
Conference Proceeding -
17
Integration of Firewall and IDS on Securing Mobile IPv6
Published in 2020 2nd International Conference on Industrial Electrical and Electronics (ICIEE) (20-10-2020)“…The number of Mobile device users in the word has evolved rapidly. Many internet users currently want to connect the internet for all utilities automatically…”
Get full text
Conference Proceeding -
18
Enhancing IPsec Performance in Mobile IPv6 Using Elliptic Curve Cryptography
Published in 2019 6th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI) (01-09-2019)“…Internet has become indispensable to the modern society nowadays. Due to the dynamic nature of human activities, the evolving mobile technology has played a…”
Get full text
Conference Proceeding -
19
Security mechanism for IPv6 stateless address autoconfiguration
Published in 2015 International Conference on Automation, Cognitive Science, Optics, Micro Electro-Mechanical System, and Information Technology (ICACOMIT) (01-10-2015)“…Internet Protocol version six (IPv6) was designed and developed to solve the problem of exhaustion of current Internet address. IPv6 also introduces a number…”
Get full text
Conference Proceeding -
20
Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks
Published in IEEE access (01-01-2020)“…Vehicle Ad hoc Networks (VANETs) are an emergent wireless communication technology that has the potential to reduce the risk of accidents caused by drivers and…”
Get full text
Journal Article