• Defence mechanisms evaluation against RA flood attacks for Linux Victim Node 

      Kolahi, Samad; Barmada,Bashar; Mudaliar, Keysha (Asia-Pacific Signal and Information Processing Association (APSIPA), 2017-12)
      This research evaluates the performance of different defence mechanisms used in IPv6 networks to protect against router advertisement (RA) flood attacks that rely in ICMPv6 Router Advertisement messages to flood the network. ...
    • Impact of IPSec security on VoIP in different environments 

      Kolahi, Samad; Mudaliar, Keysha; Zhang, C.; Gu, Z. (2017-07)
      In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...
    • Impact of IPSec security on VoIP in different environments 

      Kolahi, Samad; Mudaliar, Keysha; Zhang, C.; Gu, Z. (Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)
      In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ...