Doomed to Repeat with IPv6? Characterization of NAT-centric Security in SOHO Routers.
Karl OlsonJack WamplerEric KellerPublished in: ACM Comput. Surv. (2023)
Keyphrases
- network layer
- network traffic
- intrusion detection
- ip address
- end to end
- network security
- application layer
- information security
- computer networks
- access control
- security requirements
- security problems
- computer security
- security policies
- statistical databases
- campus network
- load balancing
- internet protocol
- network management
- security mechanisms
- security management
- authentication protocol
- security systems
- ip addresses
- information assurance
- security threats
- cross layer
- security protocols
- key management
- security issues
- network architecture
- routing protocol