Kolahi, Samad Almatrook, A.A.
In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of IPv4 and IPv6 on average decreased by 16.79% and 10.22% respectively. Throughput for UDP is decreased by 18.07% and 12.99% for IP...
Kolahi, Samad Almatrook, A.A.
In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of IPv4 and IPv6 on average decreased by 16.79% and 10.22% respectively. Throughput for UDP is decreased by 18.07% and 12.99% for IP...
Kolahi, Samad Mudaliar, Keysha Zhang, C. Gu, Z.
In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput are almost same for both operating systems. CPU usage was higher on both operating systems with IPsec enabled and the results for...
Airehrour, David Ray, J. Ray, S. K.
This research addresses blackhole and selective forwarding routing attacks, whichare fundamental security attacks on the routing of data in IoT networks. Most IoT devices today,from medical devices to connected vehicles and even smart buildings, have the capability ofcommunicating wirelessly with one another. Although, consumers are progressively e...
Ho, Trung Minh
Twitter is a popular Social Network Service. It is a web application with dual roles of online social network and microblogging. Users use Twitter to find new friends, update their activities or communicate with each other by posting tweets. Its popularity attracts many spammers wanting to spread advertising or malware. Many systems are proposed to...
Sarrafpour, Bahman Abbaro, C. Pitton, I. Young, C. Madipour, Farhad
Denial of Service (DoS) attacks are a type of interruption (malicious and/or unintended) that restrict or completely deny services meant for legitimate users. One of the most relevant DoS attacks is Distributed Denial of Service (DDoS) attack which is a variant of DoS, but on a larger scale using previously compromised, malware infected computers k...
Tirumala, Sreenivas Sremath Sarrafzadeh, Hossein
There has been an exponential increase in the usage of the internet, particularly among students since the introduction of e-learning and Bring Your Own Device (BYO) initiatives into the education system. In New Zealand the percentage of the population using the internet is now 93.8% and this increase in internet usage has increased the risk of cyb...
Mohaddes Deylami, Hanif Muniyandi, R.C. Ardekani, Iman Sarrafzadeh, Hossein
Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends on the technology used. Therefore, it is paramount that the advantages and disadvantages of each type of technology are scrutin...
Kolahi, Samad Cao, Yuqing (Rico) Chen, Hong
IPSec (IP Security) and SSL (Secure Socket Layer) are the main technologies for securing communications via the Internet. In this paper, we present new results on the performance of SSL using Windows 7 operating system under IEEE802.11n wireless network. Enabling IPSec security results on average approximately 50% less TCP throughout while enabling...
Mohammed, Alghamdi Talal
RESEARCH OBJECTIVE: The key objective of the research is to find out the impact of enabling security protocols on the WLAN performance in a real test bed environment. The research has measured the 802.11ac WLAN performance with WLAN security protocols enabled and disabled. Moreover, this research has used the IPv4 as well as IPv6, with TCP/UDP pack...