Academic literature on the topic '8021X Authentication and DHCP'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic '8021X Authentication and DHCP.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "8021X Authentication and DHCP"

1

Huangfu, Dapeng, Xiaoping Tian, Xingjian Wang, and Ping Chen. "Research and Mass Deployment of Non-cognitive Authentication Strategy Based on Campus Wireless Network." ITM Web of Conferences 17 (2018): 01013. http://dx.doi.org/10.1051/itmconf/20181701013.

Full text
Abstract:
With the rapid development of Internet +, the dependence on wireless networks and wireless terminals are increasing. Campus wireless network has become the main network of teachers and students in campus on the internet. As there are uneven clients and a wide variety of intelligent terminals now. Simplified authentication and network security become the most urgent problem for wireless network. This paper used the Portal + Mac authentication method to realize the non-cognitive authentication of teachers and students on basis of the analysis of the advantages and disadvantages of mainstream authentication of campus wireless network, such as 802.1X authentication, Portal authentication, Mac authentication and DHCP authentication. Teachers and students only need portal certification at the first time, then surf the internet with non-perceived authentication at the second time and later. This method increases network security, and is better to meet the needs of teachers and students.
APA, Harvard, Vancouver, ISO, and other styles
2

Mansoor, Farooq, Khan Rafi, and Hassan Khan Mubashir. "Stout Implementation of Firewall and Network Segmentation for Securing IoT Devices." Indian Journal of Science and Technology 16, no. 33 (2023): 2609–21. https://doi.org/10.17485/IJST/v16i33.1262.

Full text
Abstract:
Abstract <strong>Objectives:</strong>&nbsp;To develop algorithms for different types of firewalls and their implementation for securing IoT devices. Assess the effectiveness of the developed algorithms and highlights the importance of a comprehensive approach to securing IoT devices, including maintaining strong authentication and encryption, secure communication protocols, and keeping devices updated with the latest security measures.&nbsp;<strong>Methods:</strong>&nbsp;The present study focuses on creating algorithms that can be used to secure IoT devices through various types of firewalls, including traditional firewalls, Next-generation (NGFW), stateful inspection, packet filtering firewalls, application-level gateways, and network segmentation. These algorithms can be integrated into existing infrastructure or used to design a completely new system. The firewalls are then configured to properly filter network traffic, monitor communication trends, and implement IoT-specific security regulations. The integrated firewall system is thoroughly tested and evaluated to assess its functionality, performance, and effectiveness in securing IoT devices.&nbsp;<strong>Findings:</strong>&nbsp;To evaluate the effectiveness of the developed algorithms, several experiments were conducted and the system achieved an accuracy of 99% which results a high level of success in protecting IoT devices from cyber threats. These algorithms are specifically designed to address the vulnerabilities and security challenges associated with IoT devices.<strong>&nbsp;Novelty and applications:</strong>&nbsp;The novelty of this paper lies in the development of algorithms for different types of firewalls and their implementation specifically for securing IoT devices. The focus on IoT devices and their unique vulnerabilities is an important aspect of this research. Each type of firewall has its strengths and weaknesses, and the paper likely discusses how they can be effectively employed to secure IoT devices. This suggests that the proposed firewall algorithms are effective in mitigating cyber threats and enhancing the security of IoT devices. <strong>Keywords:</strong> Firewalls; NGFW; Stateful Inspection Firewalls; IoT; Cyberattacks; cybersecurity; VPN; AES; IKE; L2TP; NAC; 8021X Authentication and DHCP
APA, Harvard, Vancouver, ISO, and other styles
3

Sarip, Nfn, and Arief Setyanto. "Packet Filtering Based On Differentiated Services Code Point For DHCP Starvation Attacks Prevention." Journal Pekommas 4, no. 2 (2019): 137. http://dx.doi.org/10.30818/jpkm.2019.2040204.

Full text
Abstract:
The use of the internet today has become a necessity, the most commonly used media to connect to the internet is a Wireless LAN network. For easy access to the network, DHCP service become a standard feature that must exist, because ordinary users no longer need to think about procedures for configuring IP addresses, all of which have been done automatically by the DHCP service. But it turns out that there is a security threat to DHCP service, namely DHCP Starvation attacks that can be exhausting the availability of IP addresses in DHCP service so that the configuration of IP address automatically can no longer be done on the client. Various methods such as authentication, cryptography, and machine learning are used by researchers in preventing DHCP Starvation attacks, but the issue of effectiveness and efficiency still opens up further research opportunities. In this research, packet filtering methods based on DSCP code applied to the Netfilter system are used to do prevention of DHCP Starvation attacks, this method has proven to be very effective in making prevention and more efficient when applied on small scale wireless networks such as at office networks and internet cafe.
APA, Harvard, Vancouver, ISO, and other styles
4

Yakubu, Bello Musa, Majid Iqbal Khan, and Pattarasinee Bhattarakosol. "IPChain: Blockchain-Based Security Protocol for IoT Address Management Servers in Smart Homes." Journal of Sensor and Actuator Networks 11, no. 4 (2022): 80. http://dx.doi.org/10.3390/jsan11040080.

Full text
Abstract:
The dynamic host configuration protocol (DHCP) servers are forms of an Internet of Things (IoT) address management server (IoTAMS) that gives network configuration settings to newly connected hosts. Administrators of a network may save time by setting DHCP servers instead of every network node. However, the absence of a more robust authentication method for DHCP servers makes hosts susceptible to attacks since neither the server nor the users are able to check the other’s authenticity during DHCP connections. These concerns result in both internal and external threats to the system that have the potential to impair network services. Among these threats are malicious DHCP servers and DHCP starvation. This paper aims to provide a novel approach for tackling these issues and protect the DHCP protocol. The proposed model uses the Diffie–Hellman key exchange mechanism, the elliptic curve discrete logarithm problem (ECDLP), a one-way hash function, blockchain technology, and a smart contract. In addition, registration and validation processes provide support for the proposed model in combating DHCP risks for both internal and external system threats. Results from this study show that the proposed model has an average of 21.1% more resistance to a growing number of adversaries than the benchmark models, thus revealing that the model is better suited for the security of IoT address management servers in smart homes, thereby enhancing resilience against related threats and the success of IP address management.
APA, Harvard, Vancouver, ISO, and other styles
5

Liao, Xiao Qun, Jian Chang, and An Xin Zhao. "Design and Development of Campus Network Authentication and Accounting System Based on Radius Protocol." Applied Mechanics and Materials 411-414 (September 2013): 507–13. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.507.

Full text
Abstract:
In order to build a safe and harmonious digital campus network, to achieve user authentication, accounting, and management, using DHCP+Web+Radius type gateway authentication accounting mode, set up with flexible accounting way authentication accounting system. The system is based on the Radius communication protocol, through the JSP+ExtJS+STRUTS application framework, and combined with the JDBC+MySQL to achieve the network management system and the perfect combination of users self-service system, can flexibly change the accounting methods, greatly reducing the manual operation and effectively interact with network monitoring data.
APA, Harvard, Vancouver, ISO, and other styles
6

Siregar, Jonathan Daniel, and Ahmad Chusyairi. "Implementasi Authentication Captive Portal Pada Wireless Local Area Network di PT. St. Morita Industries." Jikom: Jurnal Informatika dan Komputer 14, no. 1 (2024): 14–24. http://dx.doi.org/10.55794/jikom.v14i1.119.

Full text
Abstract:
PT. St. Morita Industries has a Wireless Local Area Network (WLAN) which is used as a medium for exchanging data and information by utilizing wireless transmission media, WLAN currently uses WPA2-PSK as a security system to authenticate users to access the internet. However, the use of WPA2-PSK as WLAN security still has a weakness due to the use of the same 1 password for many users in order to connect to the WLAN hotspot will be an opportunity for cyber crime. This happens because it will be very easy for irresponsible users to enter the WLAN. Therefore, in this study, captive portal authentication will be applied as an effort to increase WLAN security replaces WPA2-PSK. This research process uses the Network Development Life Cycle (NDLC) method. All the configurations needed to build the captive portal authentication take advantage of the Winbox program. This research has resulted in a special user authentication limitation for users who have registered on the WLAN is permitted to access this company's internet. In addition, the Winbox program can also be used for monitoring all users connected to the WLAN, both active and inactive users. By setting up captive portal authentication on a WLAN network using a proxy routerboard device which comprises an IP address, DHCP server, hostpot setup, NAT firewall, and DNS server one can create a WPA2-PSK security system. This configuration is completed with the aid of the Winbox v3.37 software.
APA, Harvard, Vancouver, ISO, and other styles
7

Oktaviani, Reza, and Dian Novianto. "Manajemen User Dan Bandwidth Pada Hotspot Di Kantor BUMD Provinsi Bangka Belitung Menggunakan Router Mikrotik." Jurnal Sisfokom (Sistem Informasi dan Komputer) 4, no. 1 (2015): 47. http://dx.doi.org/10.32736/sisfokom.v4i1.203.

Full text
Abstract:
Untuk membangun jaringan pada kantor BUMD, dibutuhkan perangkat- perangkat jaringan seperti Router, Modem, Access Point, kabel UTP agar kebutuhan jaringan terpenuhi. Router digunakan untuk mengatur lalulintas jaringan seperti management bandwidth, pemberian IP (DHCP), authentication user. Modem sebagai koneksi ke ISP, dan Access Point sebagai koneksi wireless ke client. Dalam penyelesaian proyek ini beberapa tahap yang harus diselesaikan yaitu : menentukan area akses jaringan, menentukan topologi jaringan, menentukan alat –alat yang dibutuhkan, menentukan spesifikasi alat-alat yang dibutuhkan, dan menetukan IP yang digunakan sesuai dengan kebutuhan jaringan, dan pengujian terhadap jaringan (implementasi). Hasil yang diharapkan adalah dapat memberi suatu fasilitas yang berfungsi untuk sharing koneksi internet dan dapat menekan biaya agar lebih hemat, dan juga dapat dikembangkan penggunaannya untuk penggunaan atau manfaat lain pada jaringan.
APA, Harvard, Vancouver, ISO, and other styles
8

Umaroh, Lia, and Machsun Rifauddin. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG." BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, no. 2 (2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.

Full text
Abstract:
This study aims to explain to use a VPN in the UNISMA Library. The research method used is descriptive-qualitative and data was obtained through interviews with five informants, observation, and documentation. Data analysis techniques by collecting data, data reduction, data presentation and drawing conclusions. While the validity of the data was obtained through triangulation. The results showed that the use of VPN in the UNISMA Library to speed up internet connection and data privacy. UNISMA library uses a proxy server router operating system for VPN networks. To be able to make Mikrotik a VPN server, configuration is required which includes IP pool configuration, IP router configuration, PPP configuration, DHCP server configuration, NAT by pass firewall configuration and IP security configuration. The library selection of VPN products considers the aspects of strong authentication, encryption that is strong enough, meets standards, integration with other field network services.
APA, Harvard, Vancouver, ISO, and other styles
9

Jeong, Yeonseon, Hyunghoon Kim, and Hyo Jin Jo. "ASD: ARP Spoofing Detector Using OpenWrt." Security and Communication Networks 2022 (March 29, 2022): 1–9. http://dx.doi.org/10.1155/2022/2196998.

Full text
Abstract:
The address resolution protocol (ARP) is one of the most important communication protocols in a local area network (LAN). However, since there is no authentication procedure, the ARP is vulnerable to cyberattack such as ARP spoofing. Since ARP spoofing can be connected to critical attacks, including a man-in-the-middle (MITM) attack, detecting ARP spoofing initially without returning false-positive alarms is important. In general, however, existing works for ARP spoofing are unable to distinguish between ARP spoofing and connections from virtual machine (VM) guests, which results in false-positive alarms. In this article, we propose an access point-based ARP Spoofing Detector (ASD) that can detect ARP spoofing attacks without returning a false-positive rate. Our proposed system distinguishes between ARP spoofing and connections from VM guests using three information tables, AssocList, ARP cache table, and DHCP table, which are commonly managed by the access point based on a Linux system. We evaluated the performance of ASD on ARP spoofing attack experiments.
APA, Harvard, Vancouver, ISO, and other styles
10

S, Dr Swapna. "Advanced Threat Detection with Active Directory and SIEM." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2799–805. https://doi.org/10.22214/ijraset.2025.68478.

Full text
Abstract:
As cyber threats become more sophisticated, traditional security mechanisms relying solely on Active Directory (AD) for authentication and authorization lack real-time threat detection and response capabilities. This project enhances security by integrating AD with Splunk, a Security Information and Event Management (SIEM) solution, within a virtualized environment where Microsoft Server 2022 hosts AD services and a Domain Controller, while Splunk provides centralized security monitoring. PowerShell scripting automates user management and event log monitoring, improving administrative efficiency. To evaluate system effectiveness, a simulated password-cracking attack from a Linux machine (IP: 192.168.10.250) targets the AD server, with Splunk monitoring security logs for real-time anomaly detection, automated threat alerts, and advanced analytics to identify unauthorized access attempts, privilege escalation, and insider threats. The network setup includes grydsecurity, featuring an Active Directory Server (192.168.10.7), a Splunk Server (192.168.10.10), and a DHCP-connected client PC, with RDP restricted on client machines to prevent remote attacks but accessible on the server for administrative purposes. By integrating AD with Splunk SIEM, this system strengthens IT infrastructure security, enhances incident response, ensures compliance with regulatory frameworks such as HIPAA and GDPR, and leverages machine learning-based detection for proactive cyber defense. This project demonstrates a scalable, intelligence-driven security model that combines automation, system administration, and cybersecurity best practices to safeguard enterprise environments.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "8021X Authentication and DHCP"

1

Demerjian, Jacques, and Ahmed Serhrouchni. "DHCP Authentication Using Certificates." In Security and Protection in Information Processing Systems. Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8143-x_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Urama, Gilbert C., Chiagoziem C. Ukwuoma, Md Belal Bin Heyat, et al. "SDN-Based Cryptographic Client Authentication: A New Approach to DHCP Starvation Mitigation." In Advances in Intelligent Systems and Computing. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-0550-8_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Veltri, L., A. Molinaro, and O. Marullo. "DHCP-Based Authentication for Mobile Users/Terminals in a Wireless Access Network." In Telecommunications and Networking - ICT 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-27824-5_165.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "8021X Authentication and DHCP"

1

Jony, Asaduzzaman, Muhammad Nazrul Islam, and Rahat Ahmed Talukder. "A Secure Token-Based Approach for DHCP Client Authentication and Replay Attack Prevention." In 2024 27th International Conference on Computer and Information Technology (ICCIT). IEEE, 2024. https://doi.org/10.1109/iccit64611.2024.11022024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dinu, Dumitru Daniel, and Mihai Togan. "DHCP server authentication using digital certificates." In 2014 10th International Conference on Communications (COMM). IEEE, 2014. http://dx.doi.org/10.1109/iccomm.2014.6866756.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Korkmaz, Mehmet Halis, and Cemal Kose. "Port-based DHCP server design with authentication." In 2017 25th Signal Processing and Communications Applications Conference (SIU). IEEE, 2017. http://dx.doi.org/10.1109/siu.2017.7960334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Daniel Dinu, Dumitru, and Mihai Togan. "DHCPAuth — A DHCP message authentication module." In 2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics (SACI). IEEE, 2015. http://dx.doi.org/10.1109/saci.2015.7208238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Fuqiang, and Lin Chen. "OTP_SAM: DHCP security authentication model based on OTP." In 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2016. http://dx.doi.org/10.1109/cscwd.2016.7566012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"CERTIFICATE-BASED ACCESS CONTROL AND AUTHENTICATION FOR DHCP." In 1st International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001396100990106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shete, Aishwarya, Atul Lahade, Tejas Patil, and Renuka Pawar. "DHCP Protocol Using OTP Based Two-Factor Authentication." In 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2018. http://dx.doi.org/10.1109/icoei.2018.8553753.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Bing, Songyuan Li, and Bao Ma. "The Research and Reality of DHCP Access and Authentication Based on Embedded Terminal." In 2010 2nd International Conference on Information Technology and Computer Science (ITCS 2010). IEEE, 2010. http://dx.doi.org/10.1109/itcs.2010.125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xie, Wanjuan, Junhua Yu, and Guoqiang Deng. "A Secure DHCPv6 System Based on MAC Address Whitelist Authentication and DHCP Fingerprint Recognition." In 2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC). IEEE, 2021. http://dx.doi.org/10.1109/icnisc54316.2021.00114.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "8021X Authentication and DHCP"

1

Droms, R. Authentication for DHCP Messages. Edited by W. Arbaugh. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Morand, L., A. Yegin, S. Kumar, and S. Madanapalli. DHCP Options for Protocol for Carrying Authentication for Network Access (PANA) Authentication Agents. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Drach, S. DHCP Option for The Open Group's User Authentication Protocol. RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stapp, M., and T. Lemon. The Authentication Suboption for the Dynamic Host Configuration Protocol (DHCP) Relay Agent Option. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Droms, R., and J. Schnizlein. Remote Authentication Dial-In User Service (RADIUS) Attributes Suboption for the Dynamic Host Configuration Protocol (DHCP) Relay Agent Information Option. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!