A Feasible Method for Realizing Leakage of DHCP Transactions under the Implementation of DHCP Snooping: To what extent can DHCP snooping protect clients from the cyberattack based on DHCP spoofing.
Yao TongShigeo AkashiPublished in: DSIT (2019)
Keyphrases
- significant improvement
- fully automatic
- classification method
- preprocessing
- similarity measure
- k means
- cost function
- database
- detection method
- computational cost
- segmentation method
- high accuracy
- dynamic programming
- optimization method
- optimization algorithm
- classification accuracy
- experimental evaluation
- computational complexity
- image segmentation
- learning algorithm
- data mining