I
nd
o
ne
s
ia
n J
o
urna
l o
f
E
lect
rica
l En
g
ineering
a
nd
Co
m
p
u
t
er
Science
Vo
l.
1
2
,
No
.
1
,
Octo
b
er
201
8
,
p
p
.
1
3
7
~
1
4
6
I
SS
N:
2502
-
4752
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ee
cs
.
v
1
2
.i
1
.
p
p
137
-
1
4
6
137
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
co
r
e.
co
m/jo
u
r
n
a
ls
/in
d
ex
.
p
h
p
/
ijeec
s
Prevention
o
f
De
nia
l
-
of
-
serv
ice
in
Nex
t
G
eneratio
n
Interne
t
Protoco
l Mo
bility
M
a
a
na
s
a
a
Set
hu
ra
m
a
n
,
Sen
t
hil
k
u
m
a
r
M
a
t
hi
De
p
t.
o
f
Co
m
p
u
ter S
c
ien
c
e
a
n
d
E
n
g
in
e
e
rin
g
,
Am
rit
a
Un
iv
e
rsit
y
,
In
d
ia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
A
p
r
4
,
2
0
1
8
R
ev
i
s
ed
A
p
r
22
,
2
0
1
8
A
cc
ep
ted
Ju
n
1
4
,
2
0
1
8
In
tern
e
t
P
r
o
to
c
o
l
v
e
rsio
n
6
(I
P
v
6
)
is
a
n
e
x
t
-
g
e
n
e
ra
ti
o
n
in
tern
e
t
p
r
o
to
c
o
l
th
a
t
is
d
e
v
ise
d
to
re
p
lac
e
it
s
p
re
d
e
c
e
ss
o
r,
th
e
I
P
v
4
.
W
it
h
th
e
b
e
n
e
f
it
o
f
a
m
p
le
a
d
d
re
ss
sp
a
c
e
,
f
le
x
ib
le
h
e
a
d
e
r
e
x
t
e
n
sio
n
s
a
n
d
it
s
m
a
n
y
sp
e
c
i
f
ic
f
e
a
t
u
re
s,
I
P
v
6
is
th
e
f
u
tu
re
o
f
th
e
In
tern
e
t.
A
sig
n
if
ica
n
t
a
d
v
a
n
tag
e
o
f
IP
v
6
is
it
s
c
a
p
a
b
il
it
ies
in
th
e
d
o
m
a
in
o
f
se
c
u
rit
y
a
n
d
m
o
b
il
it
y
,
w
h
e
re
it
sc
o
re
s
in
c
o
m
p
a
ris
o
n
w
it
h
it
s
p
re
d
e
c
e
ss
o
r.
On
e
o
f
th
e
fe
a
tu
re
s
sp
e
c
i
f
ic
to
IP
v
6
,
su
c
h
a
s
th
e
m
a
n
d
a
to
ry
IP
se
c
m
e
ss
a
g
in
g
o
r
a
d
d
re
ss
a
u
to
-
c
o
n
f
ig
u
ra
ti
o
n
,
is
th
e
Ne
ig
h
b
o
r
Disc
o
v
e
r
y
P
r
o
to
c
o
l
(ND
P
).
Ev
e
n
th
o
u
g
h
th
e
c
o
n
c
e
p
t
o
f
se
c
u
rit
y
is
m
o
re
p
ro
n
o
u
n
c
e
d
i
n
th
e
I
P
v
6
p
ro
to
c
o
ls
,
th
e
re
stil
l
e
x
ist
lo
o
p
h
o
les
.
T
h
e
e
x
ten
siv
e
a
p
p
li
c
a
ti
o
n
s
o
f
ND
P
m
a
k
e
it
e
v
e
n
m
o
re
n
e
c
e
ss
a
r
y
to
i
d
e
n
ti
fy
a
n
d
a
d
d
re
ss
th
e
se
issu
e
s
to
e
n
su
re
se
c
u
rit
y
.
He
n
c
e
,
th
is
p
a
p
e
r
in
v
e
stig
a
tes
lo
o
p
h
o
les
in
th
e
a
p
p
li
c
a
ti
o
n
s
o
f
ND
P
a
n
d
a
n
a
ly
z
e
s
th
e
p
ro
c
e
ss
o
f
th
e
d
e
n
ial
-
of
-
se
r
v
ice
a
t
tac
k
s
th
a
t
e
n
d
a
n
g
e
r
th
e
se
c
u
rit
y
.
A
lso
,
th
e
p
a
p
e
r
p
ro
p
o
se
s
a
n
e
w
m
e
th
o
d
t
o
m
it
ig
a
te
De
n
ial
-
of
-
S
e
rv
ice
(
Do
S
)
in
I
P
v
6
b
a
se
d
n
e
tw
o
rk
m
o
b
il
it
y
.
T
h
is
p
ro
p
o
se
d
a
p
p
ro
a
c
h
is
a
h
y
b
rid
o
f
e
x
isti
n
g
so
lu
ti
o
n
s
a
n
d
is
c
a
p
a
b
le
o
f
o
v
e
rc
o
m
in
g
th
e
sig
n
if
ica
n
t
d
isa
d
v
a
n
tag
e
s
o
f
th
e
s
e
so
lu
ti
o
n
s.
A
lso
,
th
e
p
a
p
e
r
d
is
c
u
ss
e
s
th
e
c
o
m
p
a
ra
ti
v
e
a
n
a
l
y
sis
a
m
o
n
g
th
e
e
x
isti
n
g
so
lu
ti
o
n
s an
d
il
lu
stra
tes
th
e
e
ff
e
c
t
o
f
th
e
p
r
o
p
o
se
d
m
e
th
o
d
.
K
ey
w
o
r
d
s
:
I
P
v
6
s
ec
u
r
it
y
Den
ial
-
of
-
s
er
v
ice
R
o
u
ter
d
is
co
v
er
y
Du
p
licate
ad
d
r
ess
d
etec
tio
n
Neig
h
b
o
r
d
is
co
v
er
y
Co
p
y
rig
h
t
©
2
0
1
8
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Sen
t
h
il
k
u
m
ar
Ma
t
h
i
,
Dep
t.
o
f
C
o
m
p
u
ter
Scien
ce
a
n
d
E
n
g
i
n
ee
r
in
g
,
Am
r
ita
U
n
i
v
er
s
it
y
,
I
n
d
ia
.
E
m
ail:
m
_
s
e
n
th
il@
cb
.
a
m
r
ita.
e
d
u
1.
I
NT
RO
D
UCT
I
O
N
I
P
v
6
is
a
n
et
w
o
r
k
la
y
er
p
r
o
to
co
l
th
at
is
d
ev
elo
p
ed
to
r
ep
la
ce
its
p
r
ed
ec
ess
o
r
th
e
I
P
v
4
o
w
i
n
g
to
th
e
ex
h
a
u
s
ted
ad
d
r
ess
s
p
ac
e
av
ail
ab
le
in
I
P
v
4
[
1
]
.
T
h
e
I
P
v
6
p
r
o
v
id
es
m
o
r
e
ex
te
n
s
iv
e
ad
d
r
es
s
s
p
ac
es,
al
m
o
s
t
in
th
e
r
an
g
e
o
f
3
4
0
u
n
d
ec
ill
io
n
ad
d
r
ess
es
to
s
ati
s
f
y
t
h
e
e
v
er
-
g
r
o
w
i
n
g
d
e
m
a
n
d
f
o
r
ad
d
r
ess
es
in
tu
n
e
w
i
th
th
e
in
cr
ea
s
i
n
g
n
u
m
b
er
o
f
d
ev
ice
s
co
n
n
ec
ti
n
g
to
t
h
e
I
n
ter
n
et.
I
t c
o
ex
is
t
s
w
it
h
t
h
e
alr
ea
d
y
f
a
m
ili
ar
I
P
v
4
p
r
o
t
o
co
l.
A
s
p
ec
if
ic
f
ea
tu
r
e
o
f
I
P
v
6
is
th
e
NDP
th
at
s
ee
k
s
to
r
ep
lace
th
e
A
d
d
r
ess
R
e
s
o
lu
t
io
n
P
r
o
to
co
l
(
AR
P
)
o
f
I
P
v
4
,
th
e
r
o
u
ter
d
is
co
v
er
y
an
d
th
e
r
ed
ir
ec
t
ap
p
licatio
n
s
.
Secu
r
it
y
th
r
e
ats
ar
e
r
am
p
a
n
t
o
n
th
e
I
n
ter
n
et
an
d
o
v
er
co
m
in
g
th
ese
o
r
p
r
ev
en
ti
n
g
t
h
e
m
is
m
o
r
e
r
elev
a
n
t
in
th
e
la
n
g
u
ag
e
o
f
I
P
v
6
th
a
n
t
h
e
I
P
v
4
[
2
]
.
T
h
e
m
a
n
d
ato
r
y
i
m
p
le
m
en
ta
tio
n
o
f
I
P
s
ec
u
r
it
y
in
I
P
v
6
s
ee
k
s
to
m
ak
e
t
h
e
p
r
o
to
co
l m
o
r
e
s
ec
u
r
e.
T
h
e
in
tr
o
d
u
ctio
n
o
f
I
P
v
6
i
s
ad
v
an
ta
g
eo
u
s
n
o
t
j
u
s
t
t
o
th
e
ev
er
y
d
a
y
u
s
er
,
b
u
t
also
to
th
e
s
av
v
y
c
y
b
er
cr
i
m
i
n
als
w
h
o
co
n
ti
n
u
o
u
s
l
y
s
ee
k
m
o
r
e
s
y
s
te
m
v
u
l
n
er
ab
ilit
ies
an
d
e
x
p
lo
it
th
e
m
.
Des
p
ite
th
is
f
ea
t
u
r
e,
th
e
NDP
r
em
ai
n
s
a
n
ea
s
y
tar
g
et
f
o
r
in
ter
ce
p
tin
g
an
d
s
p
o
o
f
i
n
g
th
e
m
es
s
ag
e
s
w
it
h
a
d
u
p
li
ca
te
Me
d
ia
A
cc
es
s
C
o
n
t
r
o
l
(
M
A
C
)
ad
d
r
ess
,
t
h
u
s
lead
in
g
to
attac
k
s
s
u
ch
a
s
Den
ial
-
of
-
s
er
v
ice,
Ma
n
-
in
-
t
h
e
-
Mi
d
d
le
(
MI
T
M)
,
A
R
P
p
o
is
o
n
in
g
,
f
r
a
g
m
e
n
tat
io
n
et
c.
T
h
e
m
a
n
y
ap
p
licatio
n
s
o
f
NDP
in
cl
u
d
e
r
o
u
ter
d
is
co
v
er
y
,
Neig
h
b
o
r
Un
r
ea
ch
ab
ili
t
y
Dis
co
v
er
y
(
N
UD)
,
Neig
h
b
o
r
Dis
co
v
er
y
(
ND)
,
ad
d
r
e
s
s
r
eso
lu
tio
n
,
an
d
Du
p
lica
te
A
d
d
r
ess
Dete
ctio
n
(
D
A
D)
[
3
]
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l
.
1
2
,
No
.
1
,
Octo
b
er
201
8
:
1
3
7
–
146
138
NDP
is
a
s
u
p
p
o
r
tin
g
p
r
o
to
co
l
in
I
P
v
6
t
h
at
o
p
er
ates
i
n
t
h
e
l
in
k
la
y
er
o
f
t
h
e
n
et
w
o
r
k
m
o
d
el
[
4
]
.
I
ts
f
u
n
ctio
n
alitie
s
in
cl
u
d
e
th
e
a
u
t
o
m
a
ticall
y
co
n
f
ig
u
r
i
n
g
ad
d
r
ess
,
n
eig
h
b
o
u
r
n
o
d
e
d
is
co
v
er
y
o
n
th
e
li
n
k
,
d
u
p
licat
e
ad
d
r
ess
d
etec
tio
n
,
d
etec
tin
g
d
o
m
a
in
n
a
m
e
s
er
v
er
s
an
d
av
ai
l
ab
le
r
o
u
ter
s
,
d
eter
m
i
n
i
n
g
th
e
l
in
k
la
y
er
ad
d
r
ess
o
f
th
e
co
m
m
u
n
icatin
g
n
o
d
es.
E
x
ch
a
n
g
in
g
I
C
MP
v
6
m
es
s
ag
e
s
o
n
to
p
o
f
th
e
I
P
v
6
p
r
o
to
c
o
l
is
cr
u
cial
f
o
r
I
P
v
6
co
m
m
u
n
icatio
n
as
it i
s
t
h
e
m
i
n
i
m
u
m
s
ec
u
r
it
y
p
r
e
s
cr
ib
ed
b
y
th
e
I
P
s
ec
s
ta
n
d
ar
d
s
T
ab
le
1
.
Ho
w
e
v
er
,
th
i
s
ca
n
b
e
af
f
ec
ted
,
an
d
h
en
ce
th
e
s
ec
u
r
i
t
y
ca
n
b
e
b
r
ea
ch
ed
b
y
s
e
n
d
in
g
f
ak
e
r
esp
o
n
s
e
m
e
s
s
a
g
es
to
i
n
itiate
Do
S,
tr
af
f
ic
re
-
r
o
u
ti
n
g
a
n
d
v
ar
io
u
s
o
th
er
a
ttack
s
[
5
-
7
]
.
T
h
e
n
u
m
er
o
u
s
s
t
u
d
ies
h
a
v
e
r
ein
s
tated
th
eir
s
ta
tu
r
e
b
y
s
u
g
g
esti
n
g
m
iti
g
atio
n
s
tr
ate
g
ie
s
f
o
r
th
e
s
e
attac
k
s
in
a
w
ir
ed
L
A
N,
M
AN
o
r
W
A
N
s
et
u
p
.
W
h
at
r
e
m
ai
n
s
to
b
e
d
is
co
v
er
ed
th
r
o
u
g
h
th
is
p
ap
er
is
th
e
ef
f
ec
t
o
f
t
h
ese
v
u
l
n
er
ab
ilit
ie
s
i
n
t
h
e
m
o
b
ilit
y
m
o
d
el
o
f
th
e
I
P
v
6
w
ir
ele
s
s
n
et
w
o
r
k
s
.
Hen
ce
,
th
e
p
r
ese
n
t
p
ap
er
in
v
esti
g
a
tes
t
h
e
p
o
s
s
ib
le
attac
k
s
o
n
th
ese
ap
p
licatio
n
s
w
h
e
n
p
er
f
o
r
m
ed
o
n
I
P
v
6
n
et
w
o
r
k
m
o
b
ilit
y
th
r
o
u
g
h
a
n
e
x
p
lo
r
atio
n
o
f
t
h
e
s
u
r
v
e
y
an
d
p
r
o
p
o
s
es a
m
ec
h
a
n
is
m
to
m
iti
g
ate
th
e
Do
S a
ttack
s
in
th
e
n
et
w
o
r
k
m
o
b
ilit
y
.
T
ab
le
1
.
I
C
MP
v
6
p
ac
k
et
t
y
p
es
an
d
d
escr
ip
tio
n
I
C
M
P
v
6
me
ssag
e
D
e
scri
p
t
i
o
n
R
S
–
R
o
u
t
e
r
S
o
l
i
c
i
t
a
t
i
o
n
H
e
r
e
,
t
h
e
r
o
u
t
e
r
s
a
r
e
l
o
c
a
t
e
d
b
y
h
o
st
s
i
n
a
n
a
t
t
a
c
h
e
d
l
i
n
k
b
y
u
si
n
g
t
h
e
R
S
me
ssag
e
s.
R
A
–
R
o
u
t
e
r
A
d
v
e
r
t
i
se
me
n
t
T
h
e
se
me
ssag
e
s
a
r
e
u
se
d
b
y
r
o
u
t
e
r
s
t
o
a
d
v
e
r
t
i
se
t
h
e
i
r
p
r
e
se
n
c
e
t
o
g
e
t
h
e
r
w
i
t
h
v
a
r
i
o
u
s o
t
h
e
r
l
i
n
k
s.
N
S
–
N
e
i
g
h
b
o
r
S
o
l
i
c
i
t
a
t
i
o
n
N
S
me
ssag
e
s
a
r
e
u
se
d
b
y
n
o
d
e
s
t
o
d
e
t
e
r
mi
n
e
t
h
e
l
i
n
k
-
l
a
y
e
r
a
d
d
r
e
ss
o
f
a
n
e
i
g
h
b
o
u
r
n
o
d
e
.
N
A
–
N
e
i
g
h
b
o
r
A
d
v
e
r
t
i
se
me
n
t
N
A
s a
r
e
st
a
n
d
a
r
d
r
e
sp
o
n
se
me
ssag
e
s t
o
t
h
e
N
S
me
ssag
e
s se
n
t
b
y
h
o
st
s.
R
e
d
i
r
e
c
t
U
si
n
g
t
h
i
s
me
ssag
e
,
t
h
e
r
o
u
t
e
r
s
c
a
n
i
n
f
o
r
m
h
o
st
s
o
f
a
b
e
t
t
e
r
f
i
r
st
-
h
o
p
r
o
u
t
e
r
a
n
d
a
su
i
t
a
b
l
e
p
a
t
h
f
o
r
a
d
e
st
i
n
a
t
i
o
n
,
t
h
r
o
u
g
h
w
h
i
c
h
t
h
e
p
a
c
k
e
t
s c
a
n
b
e
r
e
d
i
r
e
c
t
e
d
.
Of
t
h
e
s
i
g
n
if
ican
t
i
m
p
r
o
v
e
m
en
ts
in
I
P
v
6
ar
e
t
h
e
c
h
an
g
es
in
th
e
le
n
g
t
h
an
d
t
h
e
f
o
r
m
a
t
o
f
th
e
I
P
ad
d
r
ess
es
ass
ig
n
ed
to
n
o
d
es
a
n
d
a
s
i
g
n
i
f
ican
tl
y
s
m
aller
h
ea
d
er
s
ize.
T
h
e
m
an
d
ato
r
y
u
s
e
o
f
I
P
s
ec
,
th
e
p
r
i
m
ar
y
en
d
w
a
y
s
s
ec
u
r
it
y
m
et
h
o
d
,
en
s
u
r
es
th
e
en
h
a
n
ce
m
e
n
t
o
f
s
ec
u
r
it
y
f
ea
t
u
r
es
i
n
I
P
v
6
.
T
h
e
ex
ten
s
io
n
h
ea
d
er
th
at
is
in
tr
o
d
u
ce
d
i
n
t
h
is
f
o
r
m
at
i
s
a
d
is
tin
ct
iv
e
f
ea
t
u
r
e
o
f
t
h
is
p
r
o
to
co
l
v
er
s
io
n
a
n
d
t
h
e
I
P
s
ec
[
8
]
.
T
h
e
t
w
o
e
x
te
n
s
io
n
h
ea
d
er
s
i
n
tr
o
d
u
ce
d
in
I
P
v
6
ar
e
th
e
au
t
h
e
n
ticatio
n
h
ea
d
er
an
d
en
ca
p
s
u
latio
n
s
ec
u
r
it
y
p
a
y
lo
ad
.
T
h
ese
s
er
v
e
th
e
task
o
f
d
ata
in
te
g
r
it
y
a
n
d
co
n
f
id
en
t
ialit
y
.
As
NDP
h
elp
s
f
o
r
m
a
n
y
s
ig
n
i
f
ica
n
t
p
u
r
p
o
s
es
i
n
th
e
I
P
v
6
p
r
o
to
c
o
l
s
u
ite,
t
h
e
p
r
o
to
co
l
f
in
d
s
ap
p
licatio
n
s
i
n
n
o
t
j
u
s
t
th
e
d
ed
icate
d
w
ir
ed
n
et
w
o
r
k
s
b
u
t
al
s
o
in
th
e
Mo
b
ile
I
P
v
6
(
MI
P
v
6
)
n
et
w
o
r
k
d
o
m
ai
n
.
T
h
e
d
em
a
n
d
s
o
f
NDP
also
in
cl
u
d
e
th
e
m
ain
te
n
a
n
ce
o
f
I
P
v
6
m
o
b
ilit
y
n
et
w
o
r
k
s
,
a
n
d
m
o
ti
v
ati
n
g
m
o
b
ile
d
ev
ice
s
to
j
o
in
th
e
v
is
i
ted
n
et
w
o
r
k
li
n
k
s
[
9
]
.
T
h
e
h
o
s
t
in
it
ializatio
n
s
to
j
o
i
n
th
e
I
P
v
6
n
et
w
o
r
k
an
d
ad
d
r
ess
au
to
-
co
n
f
i
g
u
r
atio
n
ar
e
th
e
t
w
o
u
s
e
f
u
l
f
ea
t
u
r
es
o
f
f
er
ed
b
y
t
h
e
NDP
an
d
I
P
v
6
p
r
o
to
co
l
s
u
ite.
T
h
e
h
o
s
t
i
n
itia
lizatio
n
is
d
o
n
e
w
it
h
t
h
e
h
elp
o
f
t
h
e
R
S
m
es
s
ag
e
s
.
T
h
e
I
P
s
ec
tak
es
ca
r
e
o
f
th
e
s
ec
u
r
it
y
o
f
tr
an
s
m
itt
ed
p
ac
k
ets,
b
u
t
it
is
p
r
o
n
e
to
v
ar
io
u
s
ce
n
s
o
r
io
u
s
attac
k
s
.
T
h
e
m
e
s
s
a
g
e
h
ea
d
er
s
in
t
h
e
N
DP
an
d
I
C
MP
v
6
m
es
s
a
g
es
ar
e
e
m
b
ed
d
ed
w
it
h
v
ar
io
u
s
o
p
ti
o
n
s
,
w
h
ic
h
is
an
o
th
er
s
p
ec
i
f
ic
f
ea
t
u
r
e
o
f
t
h
e
I
P
v
6
p
r
o
to
co
l
s
u
ite.
T
h
e
p
r
o
to
co
l
o
p
tio
n
s
ar
e
p
r
ef
ix
in
f
o
r
m
atio
n
,
t
h
e
s
o
u
r
ce
an
d
tar
g
et
lin
k
la
y
er
ad
d
r
ess
e
s
,
r
ed
ir
ec
ted
h
ea
d
er
,
r
o
u
te
in
f
o
r
m
at
io
n
a
n
d
th
e
m
a
x
i
m
u
m
tr
an
s
m
i
s
s
io
n
u
n
it
f
o
r
th
e
p
ac
k
et.
T
h
ese
o
p
tio
n
s
ar
e
r
eg
u
lar
l
y
u
s
ed
to
p
er
f
o
r
m
th
e
v
ar
io
u
s
f
u
n
ctio
n
s
o
r
ap
p
licatio
n
s
o
f
NDP
.
T
h
e
m
an
y
f
ea
t
u
r
es
o
f
t
h
e
NDP
p
av
e
th
e
w
a
y
f
o
r
s
ev
er
e
v
u
ln
er
a
b
ilit
ies
i
n
its
ap
p
licatio
n
s
.
T
h
e
v
u
l
n
er
ab
ilit
ie
s
o
f
NDP
ar
e
o
f
th
r
ee
t
y
p
es:
1
)
r
ed
ir
ec
t
attac
k
-
m
al
icio
u
s
n
o
d
es
r
ed
ir
ec
t
th
e
p
ac
k
et
f
r
o
m
th
e
ac
tu
al
d
esti
n
at
io
n
w
h
ic
h
ca
n
n
o
t
b
e
tr
ac
ed
f
r
o
m
th
e
la
s
t
h
o
p
r
o
u
ter
,
2
)
Do
S
-
t
o
p
ass
p
ac
k
et
s
b
et
w
ee
n
n
o
d
es
is
i
n
cl
u
d
ed
in
th
is
ca
teg
o
r
y
,
an
d
3
)
f
lo
o
d
in
g
D
o
S
-
f
lo
o
d
in
g
t
h
e
v
icti
m
n
o
d
e
w
it
h
p
ac
k
et
s
,
ab
o
v
e
its
c
ap
ac
it
y
to
d
is
ab
le
co
m
m
u
n
icatio
n
w
it
h
th
e
n
et
w
o
r
k
.
I
t
i
s
also
s
u
cc
es
s
f
u
l
i
n
s
e
n
d
in
g
m
alicio
u
s
p
ac
k
et
s
as
o
n
e
a
m
o
n
g
th
e
m
u
ltit
u
d
e
o
f
tr
af
f
ic
s
en
t
to
t
h
e
v
icti
m
,
b
y
w
h
ich
w
a
y
t
h
e
attac
k
er
b
r
ea
ch
e
s
t
h
e
s
ec
u
r
it
y
o
f
t
h
e
v
icti
m
n
o
d
e
[
1
0
]
.
T
h
e
m
o
s
t
co
m
m
o
n
t
h
r
ea
ts
ar
e
th
e
MI
T
M
an
d
Do
S
at
tack
s
in
th
e
I
P
v
6
n
et
w
o
r
k
s
.
Fo
r
t
h
e
MI
T
M
attac
k
,
th
e
ac
ce
s
s
g
ai
n
i
n
g
p
h
a
s
e
is
o
n
e
w
h
er
e
th
e
i
n
v
ad
er
p
lace
s
h
i
m
s
el
f
b
et
w
ee
n
t
w
o
co
m
m
u
n
icati
n
g
p
ar
ties
tr
an
s
f
er
r
in
g
d
ata
[
1
1
]
,
an
d
f
u
r
th
er
attac
k
s
ar
e
p
o
s
s
ib
le
in
th
i
s
p
o
s
itio
n
.
T
h
e
MI
T
M
attac
k
o
cc
u
r
s
d
u
r
in
g
A
R
P
ca
ch
e
p
o
is
o
n
i
n
g
o
r
DHCP
s
p
o
o
f
in
g
i
n
I
P
v
4
.
I
n
I
P
v
6
lin
k
l
a
y
er
n
et
w
o
r
k
,
t
h
e
co
m
m
u
n
ica
tio
n
b
et
w
ee
n
n
o
d
e
s
h
ap
p
en
s
u
s
i
n
g
t
h
e
NS
a
n
d
N
A
m
es
s
a
g
es.
T
h
ese
m
es
s
ag
e
s
ar
e
u
s
ed
to
b
in
d
th
e
M
A
C
a
d
d
r
ess
to
th
e
I
P
v
6
ad
d
r
ess
o
f
th
e
n
o
d
es
o
n
t
h
e
n
et
w
o
r
k
.
Un
f
o
r
tu
n
atel
y
,
th
e
s
e
in
ter
ac
tio
n
s
ar
e
u
n
s
ec
u
r
ed
an
d
v
u
l
n
er
ab
le
to
v
ar
io
u
s
at
tack
s
.
C
o
n
s
id
er
in
g
a
n
et
w
o
r
k
w
i
th
t
w
o
n
o
d
es n
o
d
e
A
a
n
d
n
o
d
e
B
,
th
e
u
s
u
al
M
AC
lo
o
k
u
p
i
s
d
o
n
e
b
y
n
o
d
e
A
b
y
s
e
n
d
in
g
an
NS
m
e
s
s
a
g
e
to
th
e
m
u
lticas
t
ad
d
r
ess
(
FF
0
2
::1
)
in
d
icate
d
b
y
th
e
tar
g
et
ad
d
r
ess
.
I
f
th
e
n
o
d
e
B
is
ac
tiv
e
in
t
h
e
n
e
t
w
o
r
k
,
it
w
o
u
ld
b
e
an
ticip
ate
d
to
b
e
lis
ten
in
g
to
th
e
m
u
lt
icast
ad
d
r
ess
.
Af
ter
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
P
r
ev
en
tio
n
o
f D
en
ia
l
-
of
-
s
ervice
in
N
ex
t G
en
era
tio
n
I
n
tern
et
P
r
o
to
co
l Mo
b
ilit
y
(
Ma
a
n
a
s
a
a
s
eth
u
r
a
ma
n
)
139
r
ec
eiv
in
g
t
h
e
m
es
s
ag
e,
it
r
esp
o
n
s
es
w
ith
an
N
A
m
es
s
ag
e
to
n
o
d
e
A
w
it
h
t
h
e
s
o
lici
ted
(
S)
f
la
g
.
O
n
ce
n
o
d
e
A
r
ec
eiv
es
th
e
ad
v
er
ti
s
e
m
e
n
t,
it
r
ec
o
g
n
izes
t
h
at
I
P
v
6
ad
d
r
ess
o
f
n
o
d
e
B
i
s
o
n
th
e
n
o
d
e
B
’
s
MA
C
ad
d
r
ess
[
1
2
]
.
T
h
is
in
f
o
r
m
atio
n
i
s
ca
ch
ed
b
y
n
o
d
e
A
.
I
n
t
h
e
s
ce
n
ar
io
w
h
er
e
t
h
e
atta
ck
er
j
o
in
s
t
h
e
s
a
m
e
I
P
v
6
n
et
w
o
r
k
,
it
i
s
a
u
to
m
at
icall
y
a
g
r
ee
d
w
it
h
a
n
I
P
v
6
ad
d
r
ess
an
d
b
eg
i
n
s
s
n
o
o
p
in
g
to
t
h
e
m
u
ltica
s
t
g
r
o
u
p
(
FF
0
2
::1
)
.
I
n
s
u
ch
a
s
itu
a
t
io
n
,
t
h
e
attac
k
er
n
o
d
e
an
d
th
e
v
icti
m
n
o
d
e
A
ar
e
o
n
t
h
e
i
d
en
tical
L
A
N.
W
h
e
n
n
o
d
e
A
p
u
b
lis
h
e
s
a
n
NS
to
F
F0
2
::1
f
o
r
a
MA
C
lo
o
k
u
p
o
f
n
o
d
e
B
,
b
o
th
th
e
n
o
d
e
B
an
d
t
h
e
attac
k
er
r
ec
ei
v
es t
h
is
N
S
m
ess
a
g
e
f
r
o
m
n
o
d
e
A
.
W
h
i
le
n
o
d
e
B
r
esp
o
n
d
s
w
i
t
h
NA
to
n
o
d
e
A
w
it
h
t
h
e
S
f
la
g
,
th
e
a
ttack
er
r
et
u
r
n
s
w
it
h
a
n
N
A
w
i
th
th
e
S
an
d
t
h
e
o
v
e
r
r
id
e
(
O)
f
lag
s
.
T
h
e
n
o
d
e
A
r
ec
eiv
es
b
o
th
t
h
e
ad
v
er
tis
e
m
e
n
t
m
e
s
s
a
g
es
f
r
o
m
n
o
d
e
B
an
d
th
e
attac
k
er
.
Sin
c
e
th
e
attac
k
er
h
a
s
en
ab
led
th
e
O
f
la
g
,
it
o
v
er
w
r
it
es
an
d
g
e
n
er
ates
a
n
e
n
tr
y
f
o
r
n
o
d
e
A
w
h
er
ei
n
it
b
in
d
s
th
e
MA
C
ad
d
r
ess
o
f
t
h
e
attac
k
er
t
o
th
e
I
P
ad
d
r
ess
o
f
t
h
e
n
o
d
e
B
Fi
g
u
r
e
1
.
C
o
n
s
eq
u
en
tl
y
,
all
t
h
e
tr
af
f
ic
b
et
w
ee
n
t
h
e
n
o
d
es
A
a
n
d
B
u
n
d
er
g
o
t
h
e
attac
k
er
n
o
d
e
s
in
ce
th
e
r
o
u
ti
n
g
tab
le
o
f
n
o
d
e
A
co
n
tain
s
t
h
e
s
a
m
e
M
A
C
a
d
d
r
ess
f
o
r
b
o
th
th
e
n
o
d
e
B
an
d
th
e
attac
k
er
.
Fig
u
r
e
1
.
Sp
o
o
f
ed
I
C
MP
v
6
NA
m
es
s
ag
e
f
o
r
MI
T
M
A
s
i
m
ilar
p
r
o
ce
s
s
o
cc
u
r
s
i
n
s
p
o
o
f
ed
I
C
MP
v
6
R
A
al
s
o
.
T
h
e
attac
k
er
(
r
o
u
g
e
r
o
u
ter
)
p
r
eten
d
s
to
b
e
a
r
o
u
ter
an
d
s
en
d
s
t
h
e
in
ter
m
itt
en
t
R
A
m
es
s
ag
e
to
t
h
e
n
o
d
e
A
co
n
n
ec
ted
to
its
m
u
lt
icast
g
r
o
u
p
.
T
h
e
n
o
d
e
A
is
d
ec
eiv
ed
an
d
r
o
u
tes
its
p
ac
k
et
s
w
i
th
t
h
e
ad
d
r
ess
o
f
th
e
r
o
g
u
e
r
o
u
ter
as
th
e
d
ef
au
lt
g
ate
w
a
y
th
u
s
g
iv
in
g
ac
ce
s
s
to
all
t
h
e
p
ac
k
et
s
to
t
h
e
r
o
g
u
e
r
o
u
ter
[
1
3
]
.
A
r
ep
la
y
a
ttack
i
s
a
co
n
t
in
u
o
u
s
r
ep
la
y
o
f
a
n
y
p
r
ev
io
u
s
N
D
o
r
R
D
m
es
s
ag
e
to
g
ain
n
e
t
w
o
r
k
ac
ce
s
s
.
T
h
e
in
v
ad
er
ca
n
ca
p
tu
r
e
th
e
m
es
s
ag
e
a
n
d
r
ep
la
y
it
b
ac
k
af
ter
s
o
m
e
ti
m
e
to
th
e
tar
g
et
n
o
d
e.
I
t
is
m
o
s
t
d
est
r
u
ctiv
e
f
o
r
a
n
e
w
n
o
d
e
if
t
h
e
attac
k
er
o
b
tain
s
th
e
co
m
m
a
n
d
s
an
d
p
ass
w
o
r
d
s
an
d
u
s
e
s
th
e
m
to
g
ai
n
ac
ce
s
s
to
ap
p
licatio
n
s
i
n
n
o
d
e
A
.
A
d
d
r
e
s
s
a
u
to
-
co
n
f
ig
u
r
atio
n
is
o
n
e
o
f
t
h
e
s
ig
n
i
f
ica
n
t
f
ea
t
u
r
es
o
f
t
h
e
I
P
v
6
tech
n
o
lo
g
y
.
T
h
r
o
u
g
h
t
h
i
s
f
ea
t
u
r
e,
th
e
ad
d
r
ess
as
s
ig
n
m
e
n
t
o
f
t
h
e
li
n
k
-
lo
ca
l
ad
d
r
ess
es
i
s
s
i
m
p
li
f
ied
as
t
h
e
y
ar
e
a
u
to
m
atica
ll
y
a
s
s
i
g
n
ed
to
th
e
h
o
s
ts
.
T
h
o
u
g
h
a
n
ad
v
an
t
ag
e,
a
s
i
g
n
if
ican
t
f
la
w
in
th
i
s
tas
k
is
its
v
u
ln
er
ab
ilit
y
to
b
ein
g
at
tach
ed
w
it
h
in
co
r
r
ec
t
ad
d
r
ess
es,
lead
i
n
g
to
m
o
r
e
s
er
io
u
s
s
ec
u
r
it
y
b
r
ea
ch
e
s
.
O
f
t
h
e
m
a
n
y
t
y
p
es
o
f
a
ttack
s
t
h
at
ar
e
p
o
s
s
ib
le,
th
e
Do
S
attac
k
is
th
e
m
o
s
t
h
ar
m
f
u
l
a
n
d
t
h
e
m
o
s
t
f
r
eq
u
e
n
t
d
u
r
in
g
a
u
to
-
co
n
f
ig
u
r
atio
n
o
f
ad
d
r
ess
.
T
h
e
u
s
u
al
i
m
p
ac
t
o
f
a
Do
S
attac
k
o
n
th
e
v
icti
m
o
r
tar
g
et
h
o
s
t
i
s
th
at
th
e
r
eso
u
r
ce
s
allo
tted
to
th
e
h
o
s
t
ar
e
w
a
s
ted
,
an
d
th
e
co
m
m
u
n
icatio
n
lin
k
o
f
th
e
h
o
s
t
w
i
th
o
th
er
n
o
d
es
in
t
h
e
n
et
w
o
r
k
i
s
b
r
ea
ch
ed
.
A
Do
S
attac
k
in
it
iated
b
y
a
n
ex
ten
s
i
v
e
s
y
s
te
m
o
r
n
e
t
w
o
r
k
i
s
ter
m
ed
as
a
d
is
tr
ib
u
ted
Do
S
attac
k
.
Fo
r
t
h
i
s
p
u
r
p
o
s
e,
t
h
e
at
tack
er
u
s
es
v
ar
io
u
s
n
o
d
es,
o
v
er
a
d
is
tr
ib
u
ted
ar
e
a
alo
n
g
w
ith
th
e
I
n
ter
n
e
t
s
er
v
ices,
ca
lled
b
o
tn
e
ts
[
1
4
]
.
T
h
e
NDP
an
d
I
P
v
6
p
r
o
to
co
l su
ite
o
f
f
er
an
attac
k
er
n
u
m
er
o
u
s
o
p
p
o
r
tu
n
ities
to
lau
n
ch
a
Do
S a
ttac
k
.
A
u
n
iq
u
e
f
ea
t
u
r
e
o
f
t
h
e
I
P
v
6
is
th
e
ad
d
r
ess
a
u
to
-
co
n
f
ig
u
r
ati
o
n
f
o
r
lin
k
la
y
er
ad
d
r
ess
o
f
n
o
d
es.
A
n
y
n
e
w
n
o
d
e
j
o
in
in
g
a
n
e
t
w
o
r
k
u
n
d
er
g
o
e
s
m
a
n
y
o
p
er
atio
n
s
to
co
n
f
i
g
u
r
e
an
I
n
ter
f
ac
e
I
d
en
ti
f
ier
(
I
I
D)
f
o
r
its
elf
.
W
h
en
t
h
e
n
o
d
e
co
n
n
ec
ts
to
a
n
I
P
v
6
lo
ca
l
lin
k
,
an
R
S
m
es
s
ag
e
i
s
s
e
n
t
b
y
t
h
e
n
o
d
e
to
a
lo
ca
l
lin
k
r
o
u
ter
to
o
b
tain
its
n
et
w
o
r
k
p
r
ef
ix
,
a
f
te
r
w
h
ich
th
e
h
o
s
t
ca
n
g
en
er
ate
its
o
w
n
I
I
D,
I
t
t
h
en
h
as
to
co
m
b
i
n
e
t
h
e
s
u
b
n
e
t
p
r
ef
ix
a
n
d
th
e
I
I
D
to
m
a
k
e
it
s
u
n
iq
u
e
I
P
v
6
li
n
k
-
lo
ca
l
ad
d
r
ess
.
T
h
e
D
A
D
p
r
o
ce
s
s
v
er
i
f
ie
s
th
e
u
n
iq
u
e
n
ess
o
f
th
is
ad
d
r
ess
.
S
in
ce
th
e
co
m
m
u
n
ica
tio
n
is
d
o
n
e
a
m
o
n
g
n
o
d
es
i
n
a
co
m
m
o
n
li
n
k
,
a
li
n
k
la
y
er
ad
d
r
ess
s
tar
ti
n
g
w
it
h
f
e8
0
an
d
6
4
b
its
lo
n
g
.
I
t c
an
b
e
ca
r
r
ied
o
u
t b
y
t
w
o
m
et
h
o
d
s
-
E
UI
-
6
4
an
d
ex
te
n
s
io
n
m
ec
h
an
i
s
m
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l
.
1
2
,
No
.
1
,
Octo
b
er
201
8
:
1
3
7
–
146
140
T
o
en
s
u
r
e
th
e
u
n
iq
u
e
n
es
s
o
f
th
e
ad
d
r
ess
g
e
n
er
ated
o
r
o
w
n
ed
b
y
e
v
er
y
n
o
d
e
in
a
n
e
t
w
o
r
k
,
it
i
s
m
an
d
ato
r
y
t
h
at
t
h
e
y
g
o
t
h
r
o
u
g
h
th
e
D
A
D
p
r
o
ce
s
s
o
f
v
er
if
icatio
n
.
On
ce
t
h
e
tar
g
e
t
n
o
d
e
co
n
f
i
g
u
r
es
a
te
n
tat
iv
e
I
I
D,
an
NS
m
es
s
ag
e
i
s
p
u
b
l
i
s
h
ed
to
all
th
e
n
o
d
es
in
t
h
e
s
a
m
e
lin
k
,
th
r
o
u
g
h
t
h
e
m
u
l
ticast
ad
d
r
ess
(
FF
0
2
::1
)
.
I
n
th
e
ca
s
e
t
h
at
th
e
ten
tati
v
e
I
I
D
is
n
o
t
u
n
iq
u
e,
th
e
h
o
s
t
h
o
ld
in
g
t
h
is
ad
d
r
ess
r
ep
lies
w
it
h
t
h
e
N
A
m
es
s
ag
e
i
m
p
l
y
in
g
th
e
s
a
m
e
a
n
d
th
e
tar
g
et
n
o
d
e
r
ec
o
n
f
i
g
u
r
e
s
its
I
I
D
an
d
th
e
p
r
o
ce
s
s
is
r
ep
ea
ted
.
I
f
t
h
e
tar
g
et
n
o
d
e
d
o
es
n
o
t r
ec
eiv
e
a
r
ep
l
y
,
it a
s
s
u
m
es
th
at
th
e
te
n
tat
iv
e
I
I
D
is
u
n
iq
u
e.
A
Do
S
at
tack
i
n
t
h
e
D
A
D
p
r
o
ce
s
s
Fi
g
u
r
e
2
h
ap
p
en
s
w
h
en
th
e
NS
m
es
s
a
g
e
o
f
t
h
e
tar
g
e
t
n
o
d
e
is
r
ep
ea
ted
ly
r
ep
lied
w
ith
a
n
N
A
m
es
s
ag
e.
I
t
i
s
ac
h
ie
v
ed
b
y
t
h
e
attac
k
er
w
ith
t
h
e
s
o
lic
ited
b
it
(
to
n
o
te
th
at
it
i
s
in
r
ep
l
y
to
th
e
co
r
r
esp
o
n
d
in
g
NS
m
es
s
a
g
e)
an
d
o
v
er
r
id
e
b
it
(
to
in
d
icate
th
at
th
i
s
N
A
h
a
s
to
r
ep
lace
an
y
o
th
er
NA
s
en
t
b
y
a
n
ei
g
h
b
o
u
r
in
g
n
o
d
e)
en
ab
led
,
im
p
l
y
i
n
g
t
h
at
t
h
e
I
I
Ds
r
eq
u
ested
b
y
t
h
e
n
o
d
e
is
n
e
v
er
u
n
iq
u
e.
T
h
u
s
,
d
en
y
in
g
s
er
v
ice
to
th
e
t
ar
g
et
n
o
d
e
as
a
n
o
d
e
w
it
h
o
u
t
a
n
I
P
v
6
ad
d
r
ess
ca
n
n
o
t
co
m
m
u
n
icate
w
it
h
a
n
o
th
er
I
P
v
6
n
o
d
e.
A
m
ec
h
a
n
i
s
m
to
s
ec
u
r
e
th
e
D
A
D
p
r
o
ce
s
s
w
i
th
a
l
o
w
er
o
v
er
h
ea
d
h
a
s
to
b
e
d
ev
elo
p
ed
[
1
5
]
.
Fig
u
r
e
2
.
Do
S a
ttack
in
D
AD
p
r
o
ce
s
s
Giv
e
n
t
h
e
m
u
lti
f
ac
eted
r
o
le
o
f
NDP
,
it
is
e
s
s
e
n
tial
to
e
n
s
u
r
e
s
ec
u
r
it
y
in
its
ap
p
licatio
n
s
.
Sin
ce
t
h
e
I
P
s
ec
f
u
n
ctio
n
s
d
o
n
o
t
s
o
lel
y
ac
h
iev
e
t
h
is
p
u
r
p
o
s
e,
Sec
u
r
e
ND
p
r
o
to
co
l
(
SEND
)
w
as
d
ef
in
ed
.
T
h
is
p
u
r
p
o
s
e
s
till
s
ta
n
d
s
d
e
f
ea
ted
f
o
r
m
o
b
i
lit
y
I
P
v
6
as
i
t
i
s
al
w
a
y
s
i
n
co
m
p
a
tib
le
w
i
th
th
e
co
n
ce
p
t
o
f
p
r
o
x
y
ND
f
u
n
ctio
n
e
m
p
lo
y
ed
[
1
6
]
.
Fo
llo
w
in
g
t
h
e
SEND
,
a
n
e
w
I
m
p
r
o
v
ed
Se
cu
r
e
Neig
h
b
o
r
Dis
co
v
er
y
(
I
S
E
ND)
p
r
o
to
co
l
th
at
o
v
er
co
m
es t
h
ese
li
m
itat
io
n
s
b
y
ad
ap
tin
g
t
h
e
SEN
D
to
th
e
co
n
ce
p
t o
f
m
o
b
ilit
y
w
as d
e
f
i
n
ed
.
I
n
SEND
p
r
o
to
co
l,
th
e
n
o
d
e
p
r
o
m
p
ti
n
g
ND
p
r
o
v
es
its
C
r
y
p
to
g
r
ap
h
ica
ll
y
Gen
er
ated
A
d
d
r
ess
e
s
(
C
G
A
)
ad
d
r
ess
o
w
n
er
s
h
ip
b
y
s
ig
n
i
n
g
it
s
m
e
s
s
a
g
es
w
it
h
a
p
r
iv
ate
k
e
y
.
A
ls
o
,
SEND
p
r
o
to
c
o
l
th
w
ar
t
s
f
u
n
c
tio
n
s
w
h
er
e
a
t
h
ir
d
p
ar
t
y
n
o
d
e
is
r
e
q
u
ir
ed
to
alter
an
NDP
m
e
s
s
a
g
e.
T
h
e
p
r
o
x
y
N
D,
a
f
ea
tu
r
e
s
p
ec
if
ic
to
I
P
v
6
,
is
o
n
e
w
h
er
e
a
p
r
o
x
y
n
o
d
e
is
allo
w
ed
to
p
r
o
d
u
ce
m
e
s
s
a
g
es i
n
s
u
p
p
o
r
t o
f
th
e
m
o
b
ile
n
o
d
e
(
MN
)
.
T
h
e
SEND
p
r
o
to
co
l
en
s
u
r
es
m
es
s
ag
e
f
r
es
h
n
es
s
,
au
t
h
e
n
tica
tio
n
an
d
i
n
te
g
r
it
y
an
d
p
r
o
v
id
es
ad
d
r
ess
o
w
n
er
s
h
ip
.
I
t
g
u
ar
d
s
t
h
e
n
o
d
e
ag
ai
n
s
t
ad
d
r
ess
s
p
o
o
f
i
n
g
a
n
d
g
iv
e
s
a
m
ec
h
a
n
is
m
to
a
u
t
h
en
ticate
th
e
ac
ce
s
s
r
o
u
ter
.
A
lo
n
g
w
it
h
C
G
A
,
t
h
e
SEND
p
r
o
to
co
l
in
tr
o
d
u
ce
s
t
h
r
ee
o
th
er
m
o
d
es
o
f
e
n
h
an
ce
m
e
n
t
-
R
S
A
s
i
g
n
a
tu
r
e,
n
o
n
ce
,
a
n
d
ti
m
esta
m
p
.
E
v
e
n
t
h
o
u
g
h
th
e
SEND
p
r
o
to
co
l
r
em
ai
n
ed
s
u
f
f
icie
n
t
to
e
n
s
u
r
e
t
h
e
s
ec
u
r
it
y
o
f
w
ir
ed
n
et
w
o
r
k
s
,
it
s
till
p
o
s
e
s
m
an
y
ch
alle
n
g
es
s
u
c
h
a
s
t
h
e
i
n
co
m
p
a
tib
ilit
y
b
et
w
ee
n
a
n
y
ca
s
t
ad
d
r
ess
an
d
SEN
D
p
r
o
to
co
l
[
1
7
]
.
Hav
i
n
g
n
o
ted
th
at
SEND
lac
k
s
i
n
s
ec
u
r
it
y
d
esp
ite
it
s
m
a
n
y
f
ea
tu
r
es,
m
a
n
y
ex
ten
s
io
n
s
w
er
e
p
r
o
p
o
s
ed
to
g
i
v
e
a
r
o
b
u
s
t p
r
o
to
co
l.
On
e
o
f
t
h
e
m
a
n
y
s
u
g
g
es
ted
ex
ten
s
i
o
n
s
w
a
s
to
d
i
s
cr
i
m
in
ate
b
et
w
e
en
t
h
e
p
r
o
x
y
’
s
r
o
le
an
d
th
e
ad
d
r
ess
o
w
n
er
s
h
ip
in
a
w
ir
ele
s
s
n
et
w
o
r
k
a
n
d
d
ef
i
n
e
th
e
tas
k
s
ap
p
r
o
p
r
iately
.
T
h
e
P
r
o
x
y
S
ig
n
at
u
r
e
(
P
S)
is
an
o
p
tio
n
in
th
e
I
C
MP
v
6
m
ess
a
g
e
h
ea
d
er
t
h
at
i
n
clu
d
e
s
th
e
d
ig
ital
s
ig
n
at
u
r
e
o
f
t
h
e
m
es
s
ag
e
g
e
n
er
ated
u
s
i
n
g
th
e
p
r
iv
a
te
k
e
y
o
f
t
h
e
p
r
o
x
y
n
o
d
e,
in
ad
d
itio
n
to
t
h
e
p
r
o
x
y
’
s
h
as
h
ed
p
u
b
lic
k
e
y
;
th
i
s
ce
r
ti
f
i
ca
te
is
e
x
te
n
d
ed
to
s
u
p
p
o
r
t
a
n
e
w
E
x
te
n
d
ed
Ke
y
Usag
e
(
E
KU)
f
ield
.
T
h
e
p
r
im
a
r
y
f
u
n
ctio
n
o
f
th
i
s
f
ield
is
to
in
d
icate
w
h
et
h
er
th
e
r
o
u
ter
ass
u
m
e
s
a
p
r
o
x
y
r
o
le.
T
h
en
,
w
h
e
n
ev
er
it
i
s
s
u
es
o
r
m
o
d
if
ies
ND
m
e
s
s
a
g
es,
it
s
ig
n
s
t
h
ese
m
es
s
ag
e
s
w
it
h
its
p
u
b
lic
k
e
y
.
T
h
e
I
SEND
co
n
ce
n
tr
ates
o
n
i
m
p
r
o
v
in
g
t
h
e
SEND
p
r
o
to
co
l
to
r
eso
lv
e
th
e
m
is
m
atc
h
es
b
e
t
w
ee
n
t
h
e
SEND
p
r
o
to
co
l
an
d
th
e
p
r
o
x
y
n
o
d
e.
W
h
en
a
n
MN
s
en
d
s
an
NS
m
es
s
ag
e
to
an
o
th
er
n
e
ig
h
b
o
u
r
n
o
d
e
in
t
h
e
s
a
m
e
n
e
t
w
o
r
k
,
t
h
e
r
ec
ei
v
er
r
es
p
o
n
d
s
w
it
h
a
n
N
A
m
es
s
a
g
e.
T
h
e
u
lti
m
ate
ch
al
len
g
e
ar
i
s
es
wh
en
t
h
e
MN
lea
v
es
its
h
o
m
e
n
et
w
o
r
k
,
w
h
ic
h
is
ad
d
r
ess
ed
b
y
t
h
e
I
SEND
p
r
o
to
co
l
[
1
8
]
.
T
h
is
p
r
o
ce
s
s
is
th
r
ee
f
o
ld
,
th
e
f
ir
s
t
p
h
a
s
e
is
r
o
u
ter
d
eleg
atio
n
,
an
d
t
h
e
s
u
b
s
eq
u
en
t s
tep
s
ar
e
d
eleg
atio
n
c
h
ec
k
in
g
a
n
d
r
ev
o
ca
tio
n
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
P
r
ev
en
tio
n
o
f D
en
ia
l
-
of
-
s
ervice
in
N
ex
t G
en
era
tio
n
I
n
tern
et
P
r
o
to
co
l Mo
b
ilit
y
(
Ma
a
n
a
s
a
a
s
eth
u
r
a
ma
n
)
141
I
n
t
h
e
co
n
te
x
t
o
f
m
o
b
ilit
y
,
wh
en
th
e
MN
lea
v
es
its
h
o
m
e
n
et
w
o
r
k
(
r
e
g
ar
d
less
o
f
w
h
et
h
er
it
is
s
till
tr
an
s
m
itti
n
g
o
r
n
o
t)
,
it
g
iv
e
s
i
t
s
r
esp
o
n
s
ib
ilit
ies
an
d
s
er
v
ice
s
to
th
e
Ho
m
e
Ag
en
t
(
H
A
)
.
Af
ter
th
i
s
d
eleg
a
tio
n
,
th
e
H
A
is
allo
w
ed
to
ac
t
a
s
a
p
r
o
x
y
an
d
ca
n
s
i
g
n
m
es
s
ag
e
s
an
d
s
e
n
d
th
e
m
o
n
b
eh
al
f
o
f
th
e
MN
.
Hen
ce
,
t
h
e
HA
ca
n
n
o
w
s
e
n
d
a
s
ec
u
r
ed
N
A
m
e
s
s
a
g
e
i
n
th
e
p
lace
o
f
t
h
e
MN
.
I
t
is
ac
h
iev
ed
u
s
in
g
a
m
o
d
if
ied
b
in
d
i
n
g
a
n
d
ac
k
n
o
w
l
ed
g
e
m
e
n
t
m
es
s
ag
e
s
.
On
ce
t
h
e
H
A
r
ec
eiv
e
s
a
m
o
d
if
ied
b
in
d
i
n
g
u
p
d
ate
f
r
o
m
MN
1
,
it
r
eg
i
s
ter
s
t
h
e
d
ele
g
at
io
n
i
n
t
h
e
d
atab
ase.
No
w
,
t
h
e
H
A
b
ec
o
m
es
t
h
e
p
r
o
x
y
f
o
r
MN
1
,
an
d
it
g
ets
an
NS
m
e
s
s
a
g
e
o
n
b
eh
al
f
o
f
MN
1
f
r
o
m
an
o
th
er
n
o
d
e
(
MN
2
)
f
o
r
a
M
AC
ad
d
r
ess
lo
o
k
u
p
(
t
h
e
d
esti
n
atio
n
o
f
th
e
NS
m
e
s
s
a
g
e
f
r
o
m
MN
2
is
MN
1
)
.
H
A
co
n
s
u
lts
it
s
d
atab
ase
to
ch
ec
k
f
o
r
a
d
eleg
atio
n
b
y
t
h
e
MN
1
t
o
allo
w
th
e
H
A
th
e
p
er
m
i
s
s
io
n
to
ac
t
o
n
b
eh
al
f
o
f
MN
1
.
I
f
it
f
i
n
d
s
an
ap
p
r
o
p
r
iate
d
eleg
atio
n
,
t
h
e
N
A
m
ess
a
g
e
is
g
e
n
er
ated
an
d
s
i
g
n
ed
b
y
th
e
H
A
i
n
s
tead
o
f
MN
1
.
T
h
is
m
e
s
s
a
g
e
i
s
t
h
en
s
en
t
to
t
h
e
MN
2
.
I
f
it
d
o
es
n
o
t
f
i
n
d
an
ap
p
r
o
p
r
iate
r
eg
is
tr
atio
n
,
it
d
r
o
p
s
th
e
NS
p
ac
k
et
o
r
tr
ea
ts
it
a
s
it
w
o
u
ld
tr
ea
t
an
y
s
ec
u
r
e
p
ac
k
et.
I
n
t
h
e
ca
s
e
t
h
at
t
h
e
r
o
u
ter
d
eleg
a
tio
n
v
er
if
icatio
n
i
s
s
u
cc
e
s
s
f
u
l,
th
e
n
ei
g
h
b
o
u
r
ca
c
h
e
s
h
o
u
ld
b
e
u
p
d
ated
p
r
o
m
p
tly
.
W
ith
th
ese
o
p
tio
n
s
,
th
e
r
o
u
ter
p
r
o
v
es
th
at
it
is
d
eleg
ated
b
y
M
N1
to
ac
t
in
it
s
s
tead
as
a
p
r
o
x
y
an
d
it
ca
n
an
s
w
er
all
N
S
m
e
s
s
a
g
es
t
h
r
o
u
g
h
th
e
m
o
d
if
ied
N
A
m
es
s
ag
e.
E
f
f
ec
tiv
e
l
y
,
t
h
is
co
v
er
s
th
e
p
h
ase
o
f
r
o
u
ter
d
eleg
at
io
n
c
h
ec
k
in
g
.
T
h
e
p
r
o
ce
d
u
r
e
o
f
r
o
u
ter
d
eleg
atio
n
is
n
ec
e
s
s
ar
y
w
h
en
th
e
MN
1
r
etu
r
n
s
to
i
ts
h
o
m
e
n
e
t
w
o
r
k
.
I
t
is
d
o
n
e
to
r
ev
o
k
e
t
h
e
a
u
t
h
o
r
it
y
g
iv
en
to
t
h
e
H
A
to
ac
t
in
its
p
l
ac
e.
T
h
e
MN
1
s
e
n
d
s
a
n
N
A
m
es
s
ag
e
to
all
n
o
d
es
in
its
n
et
w
o
r
k
w
i
th
t
h
e
f
la
g
co
n
f
i
g
u
r
atio
n
s
w
h
er
e
R
a
n
d
S
f
lag
s
ar
e
n
o
t
s
e
t
an
d
O
f
lag
i
s
s
et
(
to
o
v
er
r
id
e
an
y
ex
is
t
in
g
n
ei
g
h
b
o
u
r
ca
c
h
e
e
n
tr
y
a
n
d
u
p
d
ate
t
h
e
li
n
k
la
y
er
a
d
d
r
ess
)
.
W
h
ile
t
h
e
i
n
co
m
p
ati
b
ilit
y
b
et
w
ee
n
t
h
e
SEND
p
r
o
to
co
l
an
d
th
e
p
r
o
x
y
MN
is
e
f
f
ic
ien
t
l
y
r
eso
lv
ed
t
h
r
o
u
g
h
I
SEND
,
t
h
e
in
ter
e
s
t
l
ie
s
in
h
i
g
h
li
g
h
t
in
g
t
h
e
o
th
er
v
u
l
n
er
ab
ilit
ies
i
n
SEN
D
s
u
c
h
a
s
t
h
e
in
co
m
p
atib
ilit
y
b
et
w
ee
n
a
n
y
ca
s
t
ad
d
r
ess
a
n
d
SEND
p
r
o
to
co
l
as
w
ell
as t
h
e
p
r
o
b
le
m
s
r
elate
d
to
C
G
A
v
er
i
f
icatio
n
[
1
9
]
.
As s
e
en
ea
r
lier
,
th
e
p
r
i
m
ar
y
s
h
o
r
tco
m
i
n
g
in
th
e
NDP
is
th
e
lack
o
f
i
n
teg
r
i
t
y
.
T
h
e
v
i
cti
m
n
o
d
e
is
al
m
o
s
t
al
w
a
y
s
in
ca
p
ab
le
o
f
tellin
g
t
h
e
f
a
k
e
m
e
s
s
a
g
e
f
r
o
m
a
leg
iti
m
ate
m
es
s
ag
e.
T
h
e
n
ec
e
s
s
ar
y
I
C
MP
v
6
in
te
g
r
it
y
c
h
ec
k
in
g
f
ea
t
u
r
e
o
f
ch
ec
k
s
u
m
i
s
p
r
o
v
ed
in
ef
f
icien
t.
Sin
ce
th
e
p
r
o
to
co
ls
as
m
e
n
tio
n
ed
ea
r
lier
in
v
o
l
v
e
cr
y
p
to
g
r
ap
h
ic
al
g
o
r
ith
m
s
f
o
r
ad
d
r
ess
g
e
n
er
atio
n
,
th
e
y
i
n
d
u
ce
co
m
p
u
tatio
n
al
o
v
er
h
ea
d
.
Sin
ce
t
h
e
SEND
p
r
o
to
co
l
m
a
n
d
ates
t
h
e
u
s
e
o
f
th
e
R
S
A
s
i
g
n
at
u
r
e,
C
G
A
,
ti
m
e
s
ta
m
p
a
n
d
n
o
n
ce
f
o
r
ev
er
y
m
es
s
ag
e
s
en
t
b
y
t
h
e
n
o
d
e
o
r
r
o
u
ter
.
I
n
tu
r
n
,
it
i
n
cr
ea
s
e
s
th
e
co
m
p
lex
it
y
f
o
r
b
o
th
th
e
s
en
d
er
an
d
r
ec
eiv
er
an
d
o
v
er
h
ea
d
f
o
r
t
h
e
D
A
D
p
r
o
ce
s
s
as
an
y
m
e
s
s
a
g
e
w
it
h
o
u
t
th
e
s
e
o
p
tio
n
s
i
s
ass
u
m
ed
u
n
s
ec
u
r
ed
an
d
i
s
d
is
ca
r
d
ed
.
A
ls
o
,
th
e
SEND
m
ess
a
g
es
ar
e
ca
p
ab
le
o
f
p
r
ev
en
tin
g
Do
S
attac
k
o
n
l
y
i
n
th
e
D
A
D
p
r
o
ce
s
s
,
w
h
ile
it
is
in
ca
p
ab
le
o
f
h
a
n
d
li
n
g
t
h
e
I
P
v
6
f
lo
o
d
in
g
attac
k
s
th
at
al
s
o
ca
u
s
e
t
h
e
Do
S.
Hen
ce
,
th
e
p
r
o
to
c
o
l
is
n
o
t
a
r
ec
o
m
m
e
n
d
ed
o
p
tio
n
to
s
ec
u
r
e
th
e
m
o
b
ilit
y
n
et
w
o
r
k
ag
a
in
s
t
th
e
Do
S
at
tack
s
.
An
o
th
er
p
r
o
p
o
s
ed
s
o
lu
tio
n
w
as
th
e
So
u
r
ce
A
d
d
r
ess
Valid
atio
n
I
m
p
r
o
v
e
m
e
n
t
(
S
A
VI
)
b
y
t
h
e
T
s
in
g
h
u
a
U
n
i
v
er
s
it
y
,
C
h
in
a
.
T
h
is
m
ec
h
a
n
i
s
m
w
a
s
s
u
cc
es
s
f
u
l
i
n
p
r
ev
e
n
ti
n
g
s
o
u
r
ce
ad
d
r
ess
s
p
o
o
f
i
n
g
b
y
n
o
d
es
in
t
h
e
s
a
m
e
s
u
b
n
e
t
o
f
a
n
et
w
o
r
k
w
h
er
e
NDP
m
es
s
ag
e
s
w
er
e
ex
c
h
an
g
ed
.
I
n
t
h
e
S
A
VI
m
ec
h
a
n
is
m
,
tr
u
s
ted
in
f
o
r
m
atio
n
li
k
e
t
h
e
p
o
r
t
n
u
m
b
er
an
d
M
A
C
ad
d
r
ess
o
f
th
e
tar
g
et
h
o
s
t
is
co
n
tai
n
ed
i
n
an
a
n
ch
o
r
,
w
h
ic
h
cr
ea
tes
a
b
in
d
in
g
b
et
w
ee
n
th
e
s
o
u
r
ce
I
P
ad
d
r
e
s
s
an
d
th
e
an
c
h
o
r
in
f
o
r
m
atio
n
.
A
ls
o
,
t
h
e
f
i
lter
in
g
m
ec
h
an
i
s
m
o
f
S
AVI
h
elp
s
in
d
is
ca
r
d
i
n
g
p
ac
k
et
s
t
h
at
d
o
n
o
t
co
n
f
o
r
m
to
t
h
e
co
n
s
tr
ain
ts
o
f
th
e
f
i
lter
w
h
ile
t
h
o
s
e
p
ac
k
et
s
t
h
at
m
atch
th
e
f
il
ter
ar
e
f
o
r
w
ar
d
ed
.
W
h
ile
it
i
s
a
u
s
e
f
u
l
m
eth
o
d
to
f
ilter
p
ac
k
et
s
,
S
A
VI
is
also
v
u
ln
er
ab
le
to
m
a
n
y
a
ttack
s
[
2
0
]
.
T
h
e
m
aj
o
r
d
r
aw
b
ac
k
o
f
t
h
is
m
ec
h
an
i
s
m
is
th
a
t
it
cr
ea
tes
v
u
l
n
er
ab
ilit
ie
s
in
th
e
d
y
n
a
m
ic
ad
d
r
ess
au
to
-
co
n
f
i
g
u
r
atio
n
p
r
o
ce
s
s
,
b
o
th
StateL
es
s
A
d
d
r
ess
Au
to
-
co
n
f
i
g
u
r
atio
n
(
S
L
AAC)
an
d
DHCP
v
6
as
t
h
e
co
n
s
tan
tl
y
c
h
an
g
i
n
g
I
P
ad
d
r
ess
in
cr
ea
s
e
s
th
e
d
if
f
ic
u
lt
y
i
n
b
in
d
in
g
th
e
an
c
h
o
r
in
f
o
r
m
atio
n
w
ith
it.
An
o
th
er
s
i
g
n
if
ican
t
d
is
ad
v
an
ta
g
e
o
f
t
h
e
S
A
VI
p
r
o
to
co
l
is
its
in
ab
ilit
y
in
b
i
n
d
in
g
w
h
en
d
ev
ices
w
it
h
m
u
ltip
le
I
P
ad
d
r
ess
es
ar
e
co
n
n
ec
ted
to
a
L
AN.
He
n
ce
,
ea
ch
S
AVI
m
u
s
t
w
o
r
k
in
d
ep
en
d
en
tl
y
f
r
o
m
t
h
o
s
e
d
ev
i
ce
s
v
u
ln
er
ab
le
to
tr
af
f
ic
s
p
o
o
f
i
n
g
[
2
1
]
.
Sin
ce
th
e
SEN
D
a
n
d
t
h
e
S
A
V
I
p
r
o
to
co
ls
ar
e
lack
i
n
g
,
a
n
e
w
tr
u
s
t
-
ND
p
r
o
to
co
l
w
a
s
s
u
g
g
est
ed
[
2
2
]
.
I
t
w
a
s
r
ec
o
m
m
e
n
d
ed
th
at
to
r
ed
u
c
e
th
e
co
m
p
lex
it
y
o
f
g
en
er
a
tin
g
R
S
A
s
i
g
n
at
u
r
e,
th
e
co
n
ce
p
t
o
f
s
o
f
t
s
ec
u
r
it
y
b
ased
o
n
th
e
d
i
s
tr
ib
u
ted
tr
u
s
t
m
an
a
g
e
m
e
n
t
b
e
u
s
ed
.
Si
n
ce
h
ar
d
s
ec
u
r
it
y
in
v
o
l
v
es
cr
y
p
to
g
r
ap
h
y
,
w
it
h
p
r
o
v
e
n
h
ig
h
er
co
m
p
le
x
it
y
,
t
h
e
id
ea
o
f
s
o
f
t
s
ec
u
r
i
t
y
,
b
ased
o
n
s
o
cial
in
ter
ac
tio
n
s
i
m
p
le
m
en
t
in
g
tr
u
s
t
m
a
n
ag
e
m
e
n
t
w
as
s
u
g
g
e
s
ted
.
T
h
e
s
u
g
g
ested
tr
u
s
t
-
ND
co
m
b
i
n
e
s
b
o
th
h
ar
d
an
d
s
o
f
t sec
u
r
it
y
.
T
h
e
p
r
o
to
co
l u
s
es
cr
y
p
to
g
r
ap
h
icall
y
g
en
er
ated
h
as
h
f
u
n
ctio
n
an
d
tr
u
s
t
m
a
n
ag
e
m
e
n
t
m
ec
h
an
i
s
m
f
o
r
tr
u
s
t c
alcu
latio
n
a
n
d
d
ata
in
teg
r
it
y
.
T
h
e
S
H
A
-
1
h
as
h
f
u
n
ctio
n
i
s
u
s
ed
f
o
r
d
ata
in
te
g
r
it
y
[
2
3
]
.
T
h
e
p
r
o
to
c
o
l
al
s
o
in
co
r
p
o
r
ates
th
e
b
est
o
f
th
e
SEND
,
I
P
s
ec
an
d
S
A
VI
p
r
o
to
co
ls
.
As
a
r
es
u
lt,
a
n
e
w
NDP
o
p
tio
n
ca
lled
t
h
e
tr
u
s
t
o
p
tio
n
(
3
2
b
y
tes)
i
s
e
m
b
ed
d
ed
in
th
e
NDP
m
es
s
ag
e
h
ea
d
er
s
.
T
h
e
m
es
s
a
g
es
t
h
u
s
e
x
ch
a
n
g
ed
ar
e
th
e
tr
u
s
t
-
N
S
an
d
tr
u
s
t
-
N
A
m
es
s
ag
e
s
.
Als
o
,
ea
ch
n
o
d
e
ca
lcu
late
s
t
h
e
tr
u
s
t
v
a
lu
e
o
f
its
n
ei
g
h
b
o
u
r
t
h
r
o
u
g
h
th
i
s
o
p
tio
n
.
T
h
e
m
es
s
a
g
es
w
it
h
o
u
t
t
h
i
s
f
ea
t
u
r
e
ar
e
co
n
s
id
er
ed
u
n
s
ec
u
r
ed
an
d
ar
e
d
is
ca
r
d
ed
.
I
t
m
ak
es
t
h
e
v
er
if
icatio
n
p
r
o
ce
s
s
f
a
s
ter
w
h
e
n
c
o
m
p
ar
ed
to
SEN
D,
an
d
th
e
s
m
aller
s
ize
o
f
t
h
e
o
p
tio
n
s
f
ield
h
elp
s
i
n
s
a
v
i
n
g
t
h
e
b
an
d
w
id
th
.
T
h
is
f
ea
t
u
r
e,
th
o
u
g
h
e
f
f
ec
ti
v
e
in
a
s
h
o
r
ter
n
et
w
o
r
k
i
s
u
n
te
s
ted
an
d
in
ef
f
ec
ti
v
e
f
o
r
a
m
o
r
e
ex
te
n
s
iv
e
n
et
w
o
r
k
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l
.
1
2
,
No
.
1
,
Octo
b
er
201
8
:
1
3
7
–
146
142
T
h
e
r
u
le
-
b
ased
m
ec
h
a
n
i
s
m
[
2
4
]
w
a
s
p
r
o
p
o
s
ed
to
p
r
ev
en
t
th
e
Do
S
attac
k
o
n
D
A
D
p
r
o
ce
s
s
.
I
n
th
i
s
p
r
o
ce
s
s
,
w
h
e
n
a
q
u
er
y
is
s
e
n
t
b
y
t
h
e
tar
g
e
t
n
o
d
e,
in
s
tead
o
f
r
el
y
i
n
g
o
n
t
h
e
r
ep
l
y
f
r
o
m
t
h
e
n
eig
h
b
o
u
r
i
n
g
n
o
d
es,
th
e
tar
g
e
t
n
o
d
e
v
er
if
ie
s
t
h
e
t
en
tati
v
e
ad
d
r
ess
w
it
h
t
h
e
co
n
f
ir
m
atio
n
r
ec
eiv
ed
f
r
o
m
t
h
e
co
n
tr
o
ller
s
ch
e
m
e
m
ac
h
in
e.
T
h
e
r
u
le
s
ar
e
t
y
p
ical
q
u
er
ies
to
ch
ec
k
th
e
u
n
iq
u
e
n
e
s
s
o
f
t
h
e
te
n
tat
iv
e
I
I
D.
W
h
ile
t
h
e
ap
p
licab
ilit
y
o
f
th
e
p
r
o
p
o
s
ed
m
eth
o
d
w
a
s
tes
ted
f
o
r
th
e
L
A
N
n
et
w
o
r
k
s
an
d
lin
k
lo
ca
l
co
m
m
u
n
icatio
n
,
th
e
s
ca
lab
ilit
y
an
d
i
m
p
le
m
en
ta
tio
n
o
f
t
h
e
ap
p
r
o
ac
h
in
t
h
e
m
o
b
ili
t
y
m
o
d
el
r
e
m
ai
n
u
n
tes
ted
an
d
u
n
v
er
i
f
ied
.
T
h
e
r
eg
u
lar
C
G
A
d
ata
s
tr
u
ct
u
r
e
co
n
tain
s
th
e
ele
m
e
n
ts
s
i
m
ilar
to
th
e
I
P
v
6
ad
d
r
ess
es,
th
e
s
u
b
n
e
t
p
r
ef
ix
,
a
n
d
th
e
I
I
D.
W
h
e
n
t
h
e
I
I
D
is
g
e
n
er
ated
u
s
i
n
g
th
e
p
u
b
lic
k
e
y
cr
y
p
to
g
r
ap
h
y
,
b
y
ex
p
lo
itin
g
t
h
e
C
G
A
alg
o
r
ith
m
,
v
er
i
f
icatio
n
o
f
th
e
m
es
s
ag
e,
b
y
t
h
e
r
ec
ei
v
er
p
r
o
ce
ed
s
w
it
h
o
u
t
th
e
u
s
e
o
f
an
y
p
u
b
lic
k
e
y
.
Si
n
ce
t
h
is
p
r
o
ce
d
u
r
e
is
v
u
ln
er
ab
le
an
d
p
r
o
d
u
ce
s
lar
g
e
o
v
er
h
ea
d
,
an
ef
f
icie
n
t
C
G
A
p
r
o
ce
d
u
r
e
w
a
s
p
r
o
p
o
s
ed
th
at
co
m
p
u
tes
t
h
e
I
I
D
ef
f
icie
n
tl
y
b
y
in
cl
u
d
i
n
g
t
h
e
m
o
d
if
ier
,
s
u
b
n
e
t
p
r
ef
ix
,
p
u
b
lic
k
e
y
,
c
o
llis
io
n
co
u
n
t
an
d
ex
ten
s
io
n
s
.
T
ab
le
2
.
C
o
m
p
ilatio
n
o
f
m
o
ti
v
atio
n
s
f
o
r
th
e
p
r
o
p
o
s
ed
m
et
h
o
d
I
C
M
P
v
6
me
ssag
e
D
e
scri
p
t
i
o
n
S
EN
D
C
G
A
v
e
r
i
f
i
c
a
t
i
o
n
,
a
n
y
c
a
st
a
d
d
i
n
c
o
m
p
a
t
i
b
i
l
i
t
y
,
p
r
o
x
y
N
D
i
n
c
o
m
p
a
t
i
b
i
l
i
t
y
S
A
V
I
C
a
u
se
s p
r
o
b
l
e
ms i
n
S
L
A
A
C
a
n
d
D
H
C
P
v
6
a
n
c
h
o
r
i
n
f
o
r
mat
i
o
n
b
i
n
d
i
n
g
I
S
EN
D
S
o
l
v
e
s o
n
l
y
p
r
o
x
y
N
D
i
n
c
o
mp
a
t
i
b
i
l
i
t
y
.
O
t
h
e
r
i
n
c
o
mp
a
t
i
b
i
l
i
t
i
e
s i
n
S
EN
D
r
e
mai
n
i
n
I
S
EN
D
t
r
u
st
-
ND
Ef
f
e
c
t
i
v
e
i
n
smal
l
e
r
L
A
N
n
e
t
w
o
r
k
,
u
n
t
e
st
e
d
f
o
r
l
a
r
g
e
r
L
A
N
a
n
d
W
i
r
e
l
e
ss n
e
t
w
o
r
k
s
Ef
f
i
c
i
e
n
t
C
G
A
L
i
g
h
t
w
e
i
g
h
t
a
n
d
e
f
f
i
c
i
e
n
t
b
u
t
C
G
A
e
f
f
i
c
i
e
n
c
y
p
r
o
b
l
e
m
T
h
e
SH
A
-
1
h
as
h
f
u
n
ct
io
n
i
s
u
s
ed
to
g
e
n
er
ate
t
h
e
ad
d
r
ess
a
n
d
p
r
o
v
ed
to
h
av
e
lo
w
er
t
i
m
e
c
o
m
p
le
x
it
y
an
d
h
en
ce
g
iv
e
s
a
f
aster
C
G
A.
I
t
elim
i
n
ates
t
h
e
p
o
s
s
ib
ilit
y
o
f
th
e
D
A
D
p
r
o
ce
s
s
in
C
G
A
as
th
e
w
a
y
to
tr
ig
g
er
th
e
Do
S
attac
k
s
.
I
t
i
s
b
ased
o
n
a
ti
m
er
th
at
s
ets
a
t
h
r
es
h
o
ld
to
co
n
tr
o
l
th
e
s
aid
attac
k
an
d
is
ap
p
licab
le
in
t
h
e
MI
P
v
6
n
et
w
o
r
k
s
as
w
ell.
I
t
is
n
o
ted
th
at
t
h
is
p
r
o
p
o
s
ed
m
et
h
o
d
is
a
s
tan
d
-
alo
n
e
s
o
lu
t
io
n
f
o
r
th
e
C
G
A
p
r
o
ce
s
s
alo
n
e,
an
d
m
u
s
t
b
e
u
s
ed
in
c
o
n
j
u
g
atio
n
w
it
h
o
n
e
o
f
t
h
e
d
is
cu
s
s
ed
m
et
h
o
d
s
ag
a
in
s
t
Do
S
attac
k
s
[
2
5
]
.
T
h
e
m
o
tiv
a
tio
n
f
o
r
th
e
p
r
o
p
o
s
ed
s
o
lu
tio
n
i
s
ill
u
s
tr
ated
T
ab
le
2
.
E
v
en
t
h
o
u
g
h
th
e
d
o
m
ain
o
f
s
ec
u
r
in
g
t
h
e
MI
P
v
6
n
et
w
o
r
k
s
h
as
g
i
v
e
n
r
is
e
to
m
a
n
y
p
r
o
to
co
ls
as
m
e
n
tio
n
ed
ea
r
lier
,
th
er
e
s
till
ex
is
t
ar
ea
s
th
a
t
ar
e
u
n
ex
p
lo
r
ed
o
r
u
n
m
it
ig
ated
i
n
th
e
s
c
en
ar
io
o
f
m
o
b
il
it
y
.
2.
RE
S
E
ARCH
M
E
T
H
O
D
Sin
ce
a
s
ec
u
r
e
MI
P
v
6
p
r
o
to
co
l
th
at
w
o
r
k
s
to
p
r
ev
en
t
D
o
S
attac
k
s
o
n
t
h
e
ap
p
licatio
n
s
o
f
NDP
(
esp
ec
iall
y
D
A
D
p
r
o
ce
s
s
)
is
n
ec
es
s
itated
,
th
i
s
p
ap
er
p
r
o
p
o
s
es
a
h
y
b
r
id
m
o
d
el
t
h
at
s
er
v
e
s
th
i
s
p
u
r
p
o
s
e.
T
h
e
p
r
o
p
o
s
ed
m
et
h
o
d
is
d
iv
id
ed
in
to
v
ar
io
u
s
m
o
d
u
les.
T
h
e
f
ir
s
t
m
o
d
u
le
o
f
th
e
h
y
b
r
id
p
r
o
to
c
o
l
w
o
r
k
s
o
n
g
en
er
ati
n
g
a
p
u
b
lic
an
d
p
r
iv
ate
f
o
r
th
e
MN
.
T
h
e
n
ex
t
s
tep
is
th
e
g
e
n
er
atio
n
o
f
a
C
ar
e
-
o
f
ad
d
r
ess
(
C
o
A
)
o
r
a
ten
tati
v
e
I
I
D
u
s
i
n
g
th
e
ef
f
icie
n
t
C
G
A
.
I
t
i
s
co
n
ca
te
n
ated
w
i
th
t
h
e
s
u
b
n
et
p
r
ef
i
x
to
p
r
o
d
u
ce
th
e
1
2
8
-
b
it
I
P
v
6
ad
d
r
ess
.
T
h
e
b
lo
ck
d
iag
r
a
m
o
f
th
e
p
r
o
p
o
s
ed
m
eth
o
d
is
d
ep
ict
ed
Fig
u
r
e
3
.
Fig
u
r
e
3
.
B
lo
ck
d
iag
r
a
m
o
f
t
h
e
p
r
o
p
o
s
ed
m
et
h
o
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
P
r
ev
en
tio
n
o
f D
en
ia
l
-
of
-
s
ervice
in
N
ex
t G
en
era
tio
n
I
n
tern
et
P
r
o
to
co
l Mo
b
ilit
y
(
Ma
a
n
a
s
a
a
s
eth
u
r
a
ma
n
)
143
Fig
u
r
e
4
.
Mo
d
if
ied
v
er
s
io
n
o
f
I
SEND
I
t
is
ac
h
ie
v
ed
b
y
i
n
cr
ea
s
i
n
g
t
h
e
T
T
L
o
f
t
h
e
te
n
tati
v
e
I
I
D
an
d
s
ett
in
g
it
to
a
v
al
u
e
h
ig
h
er
th
a
n
t
h
e
th
r
es
h
o
ld
v
al
u
e
f
o
r
t
h
e
ti
m
er
m
o
n
ito
r
i
n
g
t
h
e
D
AD
p
r
o
ce
d
u
r
e.
B
y
t
h
is
,
th
e
S
AVI
is
f
o
r
ce
d
to
ass
u
m
e
t
h
e
I
I
D
as
p
er
m
a
n
en
t,
h
e
n
ce
ca
p
ab
le
o
f
b
in
d
i
n
g
it
to
t
h
e
a
n
ch
o
r
i
n
f
o
r
m
at
io
n
.
T
h
e
ti
m
e
g
ap
b
et
w
e
en
t
h
e
g
en
er
atio
n
o
f
I
I
D
af
ter
li
n
k
in
g
i
t
to
t
h
e
a
n
ch
o
r
i
n
f
o
r
m
atio
n
an
d
t
h
e
i
n
itiatio
n
o
f
t
h
e
D
A
D
p
r
o
ce
d
u
r
e
is
s
i
g
n
if
ican
tl
y
in
cr
ea
s
ed
.
A
s
a
r
es
u
lt,
it
in
cr
e
ases
t
h
e
ti
m
e
f
o
r
w
h
ic
h
t
h
e
M
N
h
o
ld
s
t
h
e
s
aid
I
I
D.
T
h
e
n
e
x
t
p
h
ase
co
n
s
ti
tu
te
s
th
e
D
A
D
p
r
o
ce
d
u
r
e
w
h
er
ein
t
h
e
ti
m
er
m
o
n
ito
r
s
th
e
ti
m
e
co
n
s
u
m
ed
to
in
itiate
a
r
o
u
n
d
o
f
th
e
D
A
D
p
r
o
ce
d
u
r
e.
T
h
e
p
ar
am
eter
co
llis
io
n
C
o
u
n
t
is
s
et
in
i
tiall
y
to
ze
r
o
an
d
in
cr
e
m
en
ted
i
n
th
e
ca
s
e
t
h
at
t
h
e
ten
tati
v
e
I
I
D
is
th
e
d
u
p
licate.
A
t
h
r
es
h
o
ld
v
alu
e
o
f
th
r
ee
co
llis
io
n
s
i
s
p
er
m
itted
w
h
er
ein
,
a
f
ter
ea
ch
co
llis
io
n
,
t
h
e
MN
g
e
n
er
ates
a
n
e
w
I
I
D.
I
f
th
e
t
h
r
es
h
o
ld
is
cr
o
s
s
ed
,
th
e
atte
m
p
t
to
co
n
n
ec
t
to
th
e
n
et
w
o
r
k
b
y
m
a
k
i
n
g
a
S
L
AAC
I
I
D
is
ab
o
r
ted
,
an
d
th
e
ad
d
r
ess
i
s
m
a
n
u
al
l
y
co
n
f
i
g
u
r
ed
.
I
f
t
h
e
D
AD
p
r
o
ce
d
u
r
e
is
s
u
cc
es
s
f
u
l
an
d
t
h
e
ad
d
r
ess
i
s
f
o
u
n
d
to
b
e
u
n
iq
u
e,
th
e
I
I
D
i
s
a
s
s
i
g
n
ed
as
t
h
e
n
e
w
I
P
ad
d
r
ess
o
r
th
e
C
o
A
f
o
r
th
e
MN
.
W
h
en
th
e
M
N
lea
v
es
t
h
e
h
o
m
e
n
et
w
o
r
k
,
t
h
e
I
SEND
i
m
p
le
m
en
ta
tio
n
o
f
th
e
p
r
o
ce
s
s
o
f
r
o
u
ter
d
eleg
atio
n
is
ca
r
r
ied
o
u
t
Fi
g
u
r
e
4
.
On
ce
a
r
o
u
t
er
is
ass
ig
n
ed
as
t
h
e
p
r
o
x
y
n
o
d
e
in
p
lace
o
f
t
h
e
MN
,
a
n
y
N
S
m
es
s
a
g
es
r
ec
ei
v
ed
to
th
e
C
o
A
o
f
t
h
e
MN
is
r
ep
lied
b
y
th
e
p
r
o
x
y
n
o
d
e.
T
h
e
f
lo
w
o
f
t
h
e
p
r
o
p
o
s
ed
m
eth
o
d
is
d
ep
icted
in
Fig
u
r
e
5
an
d
6
.
3.
RE
SU
L
T
S AN
D
D
I
SCU
SS
I
O
N
A
d
etailed
an
al
y
s
is
o
f
t
h
e
ex
i
s
tin
g
an
d
th
e
p
r
o
p
o
s
ed
m
et
h
o
d
s
ar
e
d
is
cu
s
s
ed
in
th
is
s
ec
t
io
n
.
T
h
e
NDP
b
y
it
s
el
f
is
b
y
m
a
n
d
ate
r
u
n
o
n
th
e
I
P
s
ec
,
w
h
ic
h
is
an
y
ca
s
t
ad
d
r
ess
co
m
p
atib
le
b
u
t
is
i
n
ef
f
ic
ien
t
f
o
r
p
r
ev
en
ti
n
g
Do
S
attac
k
s
.
T
h
e
SEND
p
r
o
t
o
co
l
d
ev
elo
p
ed
to
b
attle
th
is
i
s
in
co
m
p
atib
le
w
it
h
a
n
y
ca
s
t
a
d
d
r
ess
es.
Si
n
ce
t
h
e
I
SEND
is
a
n
i
m
p
r
o
v
ed
v
er
s
io
n
o
f
t
h
e
SEND
p
r
o
to
co
l,
th
i
s
d
ef
icien
c
y
in
SEND
is
ca
r
r
ied
f
o
r
w
ar
d
to
I
SEND
.
T
h
e
ef
f
ec
ti
v
e
C
G
A
i
s
a
m
et
h
o
d
f
o
r
f
aster
C
G
A
g
e
n
er
atio
n
o
f
lin
k
-
lo
ca
l
ad
d
r
ess
es
an
d
is
n
o
t
co
m
p
atib
le
w
it
h
an
y
ca
s
t
ad
d
r
ess
es.
T
h
e
tr
u
s
t
-
ND
p
r
o
to
c
o
l
is
b
ased
o
n
s
o
f
t
s
ec
u
r
it
y
a
n
d
u
s
e
s
th
e
C
G
A
g
e
n
er
atio
n
s
tr
ate
g
y
o
f
th
e
SEND
f
a
m
il
y
,
w
h
ic
h
m
ak
es
t
h
is
p
r
o
to
co
l
in
co
m
p
ati
b
le
w
it
h
an
y
ca
s
t
ad
d
r
ess
es.
T
h
e
SA
VI
m
et
h
o
d
p
r
o
p
o
s
es
b
in
d
in
g
t
h
e
an
c
h
o
r
in
f
o
r
m
atio
n
w
it
h
th
e
te
n
tati
v
e,
lin
k
-
lo
ca
l
I
I
D
an
d
is
i
n
ca
p
ab
le
o
f
lin
k
i
n
g
t
h
e
an
y
ca
s
t
ad
d
r
ess
.
Sin
ce
t
h
e
s
o
l
u
tio
n
p
r
o
p
o
s
ed
in
th
is
p
ap
er
i
s
a
h
y
b
r
id
o
f
t
h
e
I
SEND
an
d
S
A
VI
p
r
o
to
co
ls
an
d
u
s
e
s
th
e
e
f
f
icie
n
t
C
G
A
al
g
o
r
ith
m
,
th
i
s
is
also
i
n
co
m
p
ati
b
le
w
it
h
t
h
e
a
n
y
ca
s
t
ad
d
r
ess
.
T
h
e
co
m
p
ar
ativ
e
an
al
y
s
is
b
ased
o
n
co
m
p
at
ib
ilit
y
is
li
s
ted
in
T
ab
le
3
.
Sin
ce
I
P
s
ec
is
a
p
r
i
m
ar
y
s
ec
u
r
it
y
m
a
n
d
ate,
it
d
o
es
n
o
t
i
n
cl
u
d
e
th
e
o
p
tio
n
o
f
d
ele
g
ati
n
g
p
r
o
x
y
n
o
d
es
f
o
r
m
o
b
ile
n
o
d
es i
n
a
m
o
b
il
it
y
n
et
w
o
r
k
.
W
h
i
le
SEND
i
s
a
r
e
aso
n
ab
l
y
ad
v
an
ce
d
p
r
o
to
co
l
w
h
en
co
m
p
ar
ed
w
it
h
I
P
s
ec
,
th
e
in
co
m
p
atib
il
it
y
o
f
p
r
o
x
y
n
o
d
es
p
er
s
is
ts
in
t
h
is
p
r
o
to
co
l
t
o
o
.
T
h
e
I
SEND
w
as
d
ev
elo
p
ed
to
tack
le
th
is
h
u
r
d
le
a
n
d
h
en
ce
is
s
p
ec
i
f
icall
y
co
m
p
a
tib
le
w
i
th
t
h
e
p
r
o
x
y
-
ND
s
y
s
te
m
.
T
h
e
S
A
VI
p
r
o
to
co
l
b
in
d
s
to
a
n
y
lin
k
-
lo
ca
l
ad
d
r
ess
an
d
h
as
n
o
r
estrictio
n
s
in
t
h
e
b
in
d
in
g
w
i
th
th
e
p
r
o
x
y
n
o
d
es.
T
h
e
tr
u
s
t
-
ND
m
e
th
o
d
o
p
en
s
n
e
w
ar
ea
s
o
f
r
esear
c
h
i
n
t
h
i
s
a
s
p
ec
t
as
t
h
e
co
m
p
a
tib
ilit
y
i
s
n
o
t
v
er
if
ied
as
y
et.
O
w
i
n
g
to
i
ts
h
y
b
r
id
n
at
u
r
e,
an
d
th
e
f
ac
t
th
at
t
h
e
r
o
o
t
p
r
o
to
co
ls
u
s
ed
i
n
t
h
e
p
r
o
p
o
s
ed
m
et
h
o
d
ar
e
alr
ea
d
y
p
r
o
x
y
ND
co
m
p
a
tib
le
,
it
is
a
ls
o
co
n
s
is
ten
t a
n
d
ca
n
b
e
p
u
t to
p
r
ac
tical
u
s
e
i
n
t
h
e
MI
P
v
6
d
o
m
a
in
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l
.
1
2
,
No
.
1
,
Octo
b
er
201
8
:
1
3
7
–
146
144
T
ab
le
3
.
C
o
m
p
ar
ativ
e
a
n
al
y
s
i
s
b
ased
o
n
co
m
p
atib
ilit
y
I
C
M
P
v
6
C
o
m
p
a
t
i
b
l
e
I
P
s
e
c
S
EN
D
I
S
EN
D
Ef
f
e
c
t
i
v
e
C
G
A
t
r
u
st
-
ND
S
A
V
I
P
r
o
p
o
se
d
A
n
y
c
a
st
a
d
d
r
e
ss
Y
e
s
No
No
No
No
No
No
P
r
o
x
y
N
D
No
No
Y
e
s
N
o
t
a
p
p
l
i
c
a
b
l
e
N
o
t
v
e
r
i
f
i
e
d
Y
e
s
Y
e
s
S
L
A
A
C
a
n
d
D
H
C
P
v
6
Y
e
s
Y
e
s
Y
e
s
Y
e
s
Y
e
s
No
Y
e
s
A
ll
o
th
er
e
x
is
t
in
g
m
et
h
o
d
s
ar
e
co
m
p
atib
le
w
i
th
d
y
n
a
m
ic
ad
d
r
ess
ass
i
g
n
m
e
n
t
f
ea
t
u
r
e,
t
h
e
S
A
VI
p
r
o
v
es
i
n
co
m
p
atib
le
w
i
th
b
i
n
d
in
g
t
h
e
an
c
h
o
r
i
n
f
o
r
m
atio
n
w
i
th
d
y
n
a
m
icall
y
c
h
a
n
g
i
n
g
ad
d
r
ess
e
s
.
T
h
e
p
r
o
p
o
s
ed
m
et
h
o
d
is
d
esig
n
ed
to
o
v
er
co
m
e
th
is
p
r
o
b
lem
a
n
d
is
h
en
ce
co
m
p
atib
le
w
it
h
S
L
AAC
an
d
DHCP
v
6
.
Usi
n
g
S
A
VI
i
n
th
e
p
r
o
p
o
s
ed
m
et
h
o
d
en
ab
les
th
e
p
r
ev
en
tio
n
o
f
s
o
u
r
ce
ad
d
r
ess
s
p
o
o
f
i
n
g
an
d
as
th
e
tr
ad
e
-
o
f
f
,
th
is
i
n
e
f
f
icie
n
c
y
o
f
S
A
VI
at
m
an
ag
i
n
g
m
u
lt
ip
le
ad
d
r
ess
es a
s
s
ig
n
ed
to
a
s
in
g
le
n
o
d
e
is
ca
r
r
i
ed
h
er
e.
A
p
ar
t
f
r
o
m
th
e
s
e
co
m
p
a
tib
ilit
y
i
s
s
u
es,
th
er
e
ar
e
m
a
n
y
o
t
h
er
p
ar
a
m
eter
s
b
ased
o
n
w
h
ic
h
t
h
e
e
x
is
t
in
g
an
d
p
r
o
p
o
s
ed
m
et
h
o
d
ca
n
b
e
c
o
m
p
ar
ed
T
ab
le
4
.
T
h
e
tr
u
s
t
m
an
ag
e
m
e
n
t
is
a
co
n
ce
p
t
o
f
s
o
f
t
s
ec
u
r
it
y
as
u
s
ed
i
n
th
e
tr
u
s
t
-
ND
p
r
o
to
co
l.
T
h
o
u
g
h
ef
f
icien
t,
it
ca
n
n
o
t
b
e
in
co
r
p
o
r
ated
in
an
y
o
f
t
h
e
o
th
er
s
u
g
g
e
s
ted
m
et
h
o
d
s
.
I
t
is
n
o
ted
th
at
t
h
e
d
i
f
f
er
e
n
t
w
a
y
s
ar
e
n
o
t
o
n
l
y
u
s
ef
u
l
a
t
p
r
ev
en
t
in
g
Do
S
attac
k
s
b
u
t
also
ca
n
b
e
i
m
p
le
m
e
n
ted
a
t
w
ir
ele
s
s
,
m
o
b
ile
an
d
L
A
N
n
et
w
o
r
k
s
.
T
h
is
p
r
o
p
er
ty
o
f
tr
u
s
t
-
ND
is
n
o
t
v
er
i
f
ied
as
y
et,
a
n
d
h
en
ce
in
t
h
e
tr
ad
e
-
o
f
f
,
t
h
e
o
t
h
er
m
eth
o
d
s
w
eig
h
m
o
r
e
s
i
g
n
if
ica
n
t,
a
s
t
h
e
p
r
o
p
o
s
ed
m
et
h
o
d
in
c
lu
d
es
th
e
f
ea
t
u
r
es
o
f
I
SEND
an
d
S
A
VI
,
th
is
co
n
ce
p
t
o
f
tr
u
s
t
m
an
ag
e
m
e
n
t
i
s
n
o
t
i
n
co
r
p
o
r
a
ted
.
T
h
e
C
G
A
i
s
a
f
ea
t
u
r
e
i
n
tr
o
d
u
ce
d
b
y
SEND
a
n
d
ca
r
r
ied
f
o
r
w
ar
d
b
y
I
SE
ND.
I
t
is
u
n
a
v
ailab
le
i
n
th
e
ess
e
n
tia
l
I
P
s
ec
m
an
d
ate,
S
A
VI
,
a
n
d
th
e
tr
u
s
t
-
N
D
p
r
o
to
co
l.
T
h
e
p
r
im
ar
y
r
ea
s
o
n
b
e
h
in
d
t
h
e
in
ef
f
icie
n
c
y
o
f
I
P
s
ec
r
eg
ar
d
in
g
co
m
p
u
tat
io
n
al
s
p
ee
d
ev
e
n
in
th
e
ab
s
e
n
ce
o
f
C
G
A
is
t
h
at
it
h
as
a
m
o
d
er
atel
y
h
i
g
h
er
co
m
p
u
tatio
n
a
l
co
s
t.
T
h
e
C
GA
g
e
n
er
atio
n
a
n
d
v
er
if
icatio
n
p
r
o
ce
s
s
es
in
SEND
an
d
I
SEND
ar
e
s
u
s
ce
p
tib
le
to
Do
S
attac
k
s
as
w
ell.
T
h
e
p
r
o
p
o
s
ed
m
et
h
o
d
is
d
esig
n
ed
to
tack
le
th
is
b
y
u
s
i
n
g
th
e
ef
f
icie
n
t
C
G
A
al
g
o
r
i
th
m
.
A
l
l
th
e
ex
i
s
ti
n
g
p
r
o
to
co
ls
ex
ce
p
t
th
e
tr
u
s
t
-
ND
ar
e
p
r
o
v
ed
to
b
e
s
ca
lab
le.
I
t
en
ab
les t
h
e
p
r
o
p
o
s
ed
m
eth
o
d
also
to
b
e
s
ca
lab
le.
Fig
u
r
e
5
.
Mo
d
if
ied
v
er
s
io
n
o
f
I
SEND
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
P
r
ev
en
tio
n
o
f D
en
ia
l
-
of
-
s
ervice
in
N
ex
t G
en
era
tio
n
I
n
tern
et
P
r
o
to
co
l Mo
b
ilit
y
(
Ma
a
n
a
s
a
a
s
eth
u
r
a
ma
n
)
145
Fig
u
r
e
6
.
Flo
w
d
iag
r
a
m
o
f
t
h
e
p
r
o
x
y
n
o
d
e
ass
i
g
n
m
e
n
t p
r
o
ce
s
s
in
m
o
d
i
f
ied
I
SEND
T
ab
le
4
.
C
o
m
p
ar
ativ
e
a
n
al
y
s
i
s
b
ased
o
n
o
th
er
p
ar
am
eter
s
I
C
M
P
v
6
me
ssag
e
I
P
s
e
c
S
EN
D
I
S
EN
D
Ef
f
e
c
t
i
v
e
C
G
A
t
r
u
st
-
ND
S
A
V
I
P
r
o
p
o
se
d
T
r
u
st
ma
n
a
g
e
me
n
t
No
No
No
N
o
t
a
p
p
l
i
c
a
b
l
e
Y
e
s
No
No
F
a
st
e
r
C
G
A
No
No
No
Y
e
s
No
No
Y
e
s
S
c
a
l
a
b
i
l
i
t
y
Y
e
s
Y
e
s
Y
e
s
N
o
t
a
p
p
l
i
c
a
b
l
e
N
o
t
v
e
r
i
f
i
e
d
Y
e
s
Y
e
s
4.
CO
NCLU
SI
O
N
I
P
v
6
is
a
d
y
n
a
m
icall
y
ev
o
l
v
i
n
g
d
o
m
a
in
,
an
d
m
o
b
ili
t
y
is
t
h
e
f
u
tu
r
e.
I
t
e
m
p
h
a
s
izes
t
h
at
th
e
s
ec
u
r
it
y
o
f
MI
P
v
6
is
also
p
ar
a
m
o
u
n
t.
T
h
e
Do
S
attac
k
s
ar
e
o
n
e
o
f
t
h
e
d
e
ad
lies
t
t
h
at
h
av
e
p
lag
u
ed
t
h
e
i
n
ter
n
et
s
ec
u
r
it
y
f
o
r
ag
es
a
n
d
co
n
ti
n
u
e
to
d
o
s
o
.
T
h
o
u
g
h
t
h
er
e
h
av
e
b
ee
n
m
a
n
y
ad
v
a
n
ce
s
a
n
d
m
a
n
y
s
ta
n
d
-
a
lo
n
e
p
r
o
to
co
ls
an
d
alg
o
r
ith
m
s
h
av
e
b
ee
n
d
e
v
elo
p
ed
to
b
attle
th
is
,
th
e
m
iti
g
atio
n
o
f
th
i
s
attac
k
in
t
h
e
MI
P
v
6
d
o
m
ai
n
is
v
er
y
f
e
w
.
T
h
e
p
r
o
p
o
s
ed
m
et
h
o
d
is
d
esi
g
n
ed
as
o
n
e
s
u
c
h
m
ec
h
a
n
is
m
t
o
en
s
u
r
e
s
ec
u
r
it
y
a
n
d
th
e
p
r
ev
en
tio
n
o
f
Do
S
attac
k
s
o
n
t
h
ese
n
et
w
o
r
k
s
.
T
h
e
p
r
o
p
o
s
ed
m
et
h
o
d
is
a
m
o
d
if
i
ed
an
d
h
y
b
r
id
s
o
lu
tio
n
.
Fro
m
t
h
e
in
v
est
ig
at
io
n
,
it
is
n
o
ted
th
a
t
t
h
e
p
r
o
p
o
s
ed
s
o
lu
tio
n
p
r
o
v
id
es
a
r
o
b
u
s
t,
a
n
d
a
s
ca
lab
le
MI
P
v
6
s
ec
u
r
it
y
m
ec
h
an
i
s
m
to
b
attl
e
t
h
e
Do
S a
ttack
s
o
n
th
e
D
AD
m
ec
h
an
i
s
m
an
d
also
o
n
t
h
e
o
th
er
a
p
p
licatio
n
s
o
f
t
h
e
NDP
.
RE
F
E
R
E
NC
E
S
[1
]
A
n
b
a
r
M
,
A
b
d
u
ll
a
h
R,
S
a
a
d
RM
,
A
lo
m
a
ri
E,
A
lsa
lee
m
S
.
“
Re
v
ie
w
o
f
se
c
u
rit
y
v
u
ln
e
ra
b
il
it
ies
i
n
t
h
e
IP
v
6
n
e
ig
h
b
o
r
d
isc
o
v
e
r
y
p
ro
to
c
o
l
”
.
In
I
n
f
o
rm
a
ti
o
n
S
c
ien
c
e
a
n
d
Ap
p
li
c
a
ti
o
n
s (
ICIS
A)
.
2
0
1
6
(p
p
.
6
0
3
-
6
1
2
)
.
S
p
rin
g
e
r,
S
in
g
a
p
o
re
.
[2
]
M
a
th
i
S
.
“
A
n
o
p
ti
m
ize
d
a
n
d
s
e
c
u
re
BUT
E
–
b
in
d
in
g
u
p
d
a
te
u
s
in
g
tw
o
f
o
ld
e
n
c
ry
p
ti
o
n
f
o
r
n
e
x
t
g
e
n
e
ra
ti
o
n
I
P
m
o
b
il
it
y
”
.
J
o
u
rn
a
l
o
f
In
telli
g
e
n
t
&
Fu
zz
y
S
y
ste
ms
.
2
0
1
8
Ja
n
1
;
3
4
(
3
):1
3
1
1
-
2
2
.
[3
]
Zh
a
n
g
T
,
W
a
n
g
Z.
“
Re
se
a
rc
h
o
n
I
P
v
6
Ne
ig
h
b
o
r
Disc
o
v
e
r
y
P
ro
to
c
o
l
(ND
P
)
se
c
u
rit
y
”
.
In
Co
mp
u
ter
a
n
d
Co
mm
u
n
ica
ti
o
n
s (
ICCC),
2
0
1
6
2
n
d
IE
EE
I
n
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
2
0
1
6
Oc
t
1
4
(p
p
.
2
0
3
2
-
2
0
3
5
)
.
[4
]
T
ian
DJ
,
Bu
tl
e
r
KR,
Ch
o
i
JI,
M
c
Da
n
iel
P
,
Krish
n
a
sw
a
m
y
P
.
“
S
e
c
u
rin
g
A
RP
/NDP
F
r
o
m
th
e
G
r
o
u
n
d
Up
”
.
IEE
E
T
ra
n
sa
c
ti
o
n
s
o
n
In
f
o
rm
a
ti
o
n
Fo
r
e
n
sic
s a
n
d
S
e
c
u
rity
.
2
0
1
7
S
e
p
;
1
2
(9
):2
1
3
1
-
4
3
.
[5
]
M
a
so
o
d
A
M
,
M
u
th
u
su
n
d
a
r
S
K.
“
In
c
u
rsio
n
Re
c
o
g
n
it
i
o
n
M
e
c
h
a
n
is
m
B
a
se
d
o
n
S
e
c
u
re
Ne
tw
o
rk
S
y
st
e
m
”
.
In
d
o
n
e
si
a
n
J
o
u
rn
a
l
o
f
El
e
c
trica
l
En
g
in
e
e
rin
g
a
n
d
Co
m
p
u
ter
S
c
ien
c
e
(
IJ
EE
CS
)
.
2
0
1
8
M
a
r
1
;
9
(3
).
[6
]
Du
rd
a
ğ
ı
E,
Bu
l
d
u
A
.
“
IP
V4
/I
P
V
6
se
c
u
rit
y
a
n
d
th
re
a
t
c
o
m
p
a
riso
n
s
”
.
Pro
c
e
d
i
a
-
S
o
c
ia
l
a
n
d
Beh
a
v
io
ra
l
S
c
ien
c
e
s
.
2
0
1
0
Ja
n
1
;
2
(2
):
5
2
8
5
-
9
1
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l
.
1
2
,
No
.
1
,
Octo
b
er
201
8
:
1
3
7
–
146
146
[7
]
M
a
th
i
S
,
Niv
e
th
a
R,
P
r
iy
a
d
h
a
rsh
in
i
B,
P
a
d
m
a
S
.
“
A
c
e
rti
f
ic
a
tele
s
s
p
u
b
li
c
k
e
y
e
n
c
r
y
p
ti
o
n
b
a
se
d
re
tu
rn
r
o
u
tab
il
it
y
p
ro
t
o
c
o
l
f
o
r
n
e
x
t
-
g
e
n
e
ra
ti
o
n
I
P
m
o
b
il
it
y
to
e
n
h
a
n
c
e
sig
n
a
ll
in
g
se
c
u
rit
y
a
n
d
re
d
u
c
e
late
n
c
y
”
.
S
ā
d
h
a
n
ā
.
2
0
1
7
De
c
1
;
4
2
(
1
2
):
1
9
8
7
-
96.
[8
]
S
a
m
a
d
F
,
M
e
m
o
n
ZA
.
“
T
h
e
F
u
tu
re
o
f
In
tern
e
t:
I
P
v
6
F
u
lf
il
li
n
g
th
e
Ro
u
t
in
g
Ne
e
d
s
in
In
ter
n
e
t
o
f
T
h
in
g
s
”
.
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
F
u
t
u
re
Ge
n
e
ra
ti
o
n
Co
mm
u
n
ica
t
io
n
a
n
d
Ne
two
rk
in
g
.
2
0
1
8
Ja
n
1
;1
1
(1
)
.
[9
]
A
h
m
e
d
A
S
,
Ha
ss
a
n
R,
Oth
m
a
n
NE.
“
IP
v
6
Ne
ig
h
b
o
r
Disc
o
v
e
r
y
P
ro
to
c
o
l
S
p
e
c
if
ica
ti
o
n
s,
T
h
re
a
ts
a
n
d
Co
u
n
term
e
a
su
re
s: A
S
u
rv
e
y
”
.
IEE
E
Acc
e
ss
.
2
0
1
7
;
5
:
1
8
1
8
7
-
2
1
0
.
[1
0
]
Ull
rich
J,
Kro
m
b
h
o
lz
K,
Ho
b
e
l
H,
Da
b
ro
w
sk
i
A
,
W
e
ip
p
l
ER.
“
IP
v
6
S
e
c
u
rit
y
:
A
tt
a
c
k
s
a
n
d
Co
u
n
t
e
r
m
e
a
su
re
s
in
a
Nu
tsh
e
ll
”
.
I
n
W
OO
T
2
0
1
4
A
u
g
1
9
.
[1
1
]
Ka
n
a
g
a
s
a
b
a
p
a
th
i
K,
De
e
p
a
k
S
,
P
ra
k
a
sh
P
.
“
A
S
tu
d
y
o
n
S
e
c
u
rit
y
Iss
u
e
s
in
Clo
u
d
C
o
m
p
u
ti
n
g
”
.
In
Pro
c
e
e
d
in
g
s
o
f
t
h
e
In
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
S
o
ft
Co
mp
u
t
in
g
S
y
ste
ms
2
0
1
6
(p
p
.
1
6
7
-
1
7
5
).
S
p
ri
n
g
e
r,
Ne
w
De
lh
i.
[1
2
]
Co
n
ti
M
,
Dra
g
o
n
i
N,
L
e
s
y
k
V
.
“
A
su
rv
e
y
o
f
m
a
n
in
t
h
e
m
id
d
le
a
tt
a
c
k
s
”
.
IEE
E
Co
mm
u
n
ica
t
io
n
s
S
u
rv
e
y
s
&
T
u
to
ri
a
ls
.
2
0
1
6
Ja
n
1
;
1
8
(3
):
2
0
2
7
-
51.
[1
3
]
S
tajk
ic
A
,
Claz
z
e
r
F
,
L
iv
a
G
.
“
N
e
ig
h
b
o
r
d
isc
o
v
e
ry
in
w
ir
e
les
s
n
e
t
w
o
rk
s:
A
g
ra
p
h
-
b
a
se
d
a
n
a
ly
sis
a
n
d
o
p
ti
m
iza
ti
o
n
”
.
In
Co
mm
u
n
ica
t
io
n
s W
o
rk
sh
o
p
s
,
I
EE
E
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
,
2
0
1
6
,
p
p
.
5
1
1
-
5
1
6
.
[1
4
]
Re
h
m
a
n
S
U,
M
a
n
ick
a
m
S
.
“
D
e
n
ial
o
f
S
e
r
v
ice
A
tt
a
c
k
in
IP
v
6
Du
p
li
c
a
te
A
d
d
re
ss
De
te
c
ti
o
n
P
ro
c
e
ss
”
.
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
A
d
v
a
n
c
e
d
C
o
mp
u
ter
S
c
ien
c
e
&
Ap
p
li
c
a
ti
o
n
s
.
2
0
1
6
;
7
:
2
3
2
-
8.
[1
5
]
P
ra
p
to
d
iy
o
n
o
S
,
Ha
sb
u
ll
a
h
IH,
Ka
d
h
u
m
M
M
,
W
e
y
CY,
M
u
ru
g
e
sa
n
RK,
Os
m
a
n
A
.
“
S
e
c
u
rin
g
Du
p
li
c
a
te
A
d
d
re
ss
De
tec
ti
o
n
o
n
I
P
v
6
Us
in
g
Distrib
u
ted
T
ru
st
M
e
c
h
a
n
ism
”
.
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
S
imu
l
a
ti
o
n
--
S
y
st
e
ms
,
S
c
ien
c
e
&
T
e
c
h
n
o
l
o
g
y
.
2
0
1
6
Oc
t
1
;
1
7
(2
6
).
[1
6
]
X
i
H.
“
T
h
e
re
se
a
rc
h
a
n
d
a
p
p
li
c
a
t
io
n
o
f
th
e
ND
P
p
ro
t
o
c
o
l
v
u
l
n
e
ra
b
il
it
y
a
tt
a
c
k
a
n
d
th
e
d
e
f
e
n
se
tec
h
n
o
l
o
g
y
b
a
se
d
o
n
S
END
”
.
In
AIP
Co
n
fer
e
n
c
e
Pro
c
e
e
d
in
g
s
2
0
1
7
M
a
y
8
(
V
o
l.
1
8
3
9
,
No
.
1
,
p
.
0
2
0
1
9
5
).
A
IP
P
u
b
li
s
h
in
g
.
[1
7
]
S
u
m
a
th
i
P
,
P
a
tel
S
.
“
S
e
c
u
re
Ne
ig
h
b
o
r
Disc
o
v
e
r
y
(S
END)
P
ro
t
o
c
o
l
c
h
a
ll
e
n
g
e
s
a
n
d
a
p
p
ro
a
c
h
e
s.
In
In
t
e
ll
ig
e
n
t
S
y
st
e
m
s
a
n
d
Co
n
tr
o
l
(IS
CO)
”.
1
0
th
I
n
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
2
0
1
6
J
a
n
7
(p
p
.
1
-
6
).
[1
8
]
El
Bo
u
a
b
id
i
I,
S
m
a
o
u
i
S
,
Zara
i
F
,
Ob
a
id
a
t
M
S
,
Ka
m
o
u
n
L
.
“
IS
END:
A
n
I
m
p
ro
v
e
d
S
e
c
u
re
Ne
ig
h
b
o
r
Disc
o
v
e
ry
P
r
o
to
c
o
l
f
o
r
W
irele
ss
Ne
t
w
o
rk
s
”
.
In
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
E
-
Bu
sin
e
ss
a
n
d
T
e
lec
o
mm
u
n
ic
a
ti
o
n
s
2
0
1
4
A
u
g
2
8
(p
p
.
5
1
8
-
5
3
5
).
S
p
ri
n
g
e
r,
Ch
a
m
.
[1
9
]
S
h
a
h
JL
.
“
A
n
o
v
e
l
a
p
p
ro
a
c
h
f
o
r
se
c
u
rin
g
IP
v
6
li
n
k
l
o
c
a
l
c
o
m
m
u
n
ica
ti
o
n
”
.
In
fo
rm
a
t
io
n
S
e
c
u
rity
J
o
u
rn
a
l:
A
Glo
b
a
l
Per
sp
e
c
ti
v
e
.
2
0
1
6
A
p
r
4
;
2
5
(
1
-
3
)
:
1
3
6
-
5
0
.
[2
0
]
Ya
o
G
,
Bi
J,
X
iao
P
.
“
S
o
u
rc
e
a
d
d
re
ss
v
a
li
d
a
ti
o
n
so
lu
ti
o
n
w
it
h
Op
e
n
F
lo
w
/NOX
a
rc
h
it
e
c
tu
re
”
.
In
N
e
two
rk
Pro
to
c
o
ls
(
ICNP),
2
0
1
1
1
9
t
h
IEE
E
In
t
e
rn
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
2
0
1
1
Oc
t
1
7
(p
p
.
7
-
1
2
).
[2
1
]
P
ra
p
to
d
iy
o
n
o
S
,
Ha
sb
u
ll
a
h
IH,
Ka
d
h
u
m
M
M
,
M
u
ru
g
e
sa
n
RK,
W
e
y
CY,
Os
m
a
n
A
.
“
I
m
p
ro
v
in
g
S
e
c
u
rit
y
o
f
Du
p
li
c
a
te
A
d
d
re
ss
De
tec
ti
o
n
o
n
IP
v
6
L
o
c
a
l
Ne
tw
o
rk
in
P
u
b
li
c
Are
a
”
.
In
M
o
d
e
ll
in
g
S
y
mp
o
si
u
m
(AM
S
),
2
0
1
5
9
t
h
Asia
2
0
1
5
S
e
p
7
(p
p
.
1
2
3
-
1
2
8
).
I
EE
E.
[2
2
]
M
o
sle
h
p
o
u
r
M
,
K
h
o
rsa
n
d
i
S
.
“
I
m
p
ro
v
in
g
c
r
y
p
to
g
ra
p
h
ica
ll
y
g
e
n
e
ra
ted
a
d
d
re
ss
a
lg
o
rit
h
m
in
I
P
v
6
se
c
u
re
n
e
ig
h
b
o
r
d
isc
o
v
e
r
y
p
ro
to
c
o
l
t
h
ro
u
g
h
tr
u
st
m
a
n
a
g
e
m
e
n
t
”
.
In
Pro
c
.
1
8
th
In
t
.
Co
n
f
.
I
n
f.
C
o
mm
u
n
.
S
e
c
u
r
.
(ICI
CS
)
2
0
1
6
Ju
n
9
(p
p
.
1
-
5
).
[2
3
]
Ra
z
a
S
,
Du
q
u
e
n
n
o
y
S
,
Hö
g
lu
n
d
J,
Ro
e
d
ig
U,
V
o
ig
t
T
.
“
S
e
c
u
re
c
o
m
m
u
n
ica
ti
o
n
f
o
r
th
e
In
ter
n
e
t
o
f
T
h
in
g
s
-
a
c
o
m
p
a
riso
n
o
f
li
n
k
‐la
y
e
r
se
c
u
rit
y
a
n
d
I
P
se
c
f
o
r
6
L
o
W
P
A
N
”
.
S
e
c
u
rity
a
n
d
C
o
mm
u
n
ica
ti
o
n
Ne
two
r
k
s
.
2
0
1
4
De
c
1
;
7
(1
2
):2
6
5
4
-
6
8
.
[2
4
]
Re
h
m
a
n
S
U,
M
a
n
ick
a
m
S
.
“
Ru
le
-
b
a
se
d
m
e
c
h
a
n
is
m
to
d
e
tec
t
De
n
i
a
l
o
f
S
e
rv
ice
(Do
S
)
a
tt
a
c
k
s
o
n
D
u
p
li
c
a
te
A
d
d
re
ss
De
tec
ti
o
n
p
ro
c
e
ss
in
I
P
v
6
li
n
k
lo
c
a
l
c
o
m
m
u
n
ica
ti
o
n
”
.
In
Relia
b
il
i
ty,
In
f
o
c
o
m
T
e
c
h
n
o
lo
g
ies
a
n
d
Op
ti
miz
a
ti
o
n
(
ICRIT
O) (
T
r
e
n
d
s a
n
d
F
u
t
u
re
Dire
c
ti
o
n
s),
2
0
1
5
4
th
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
2
0
1
5
S
e
p
2
(p
p
.
1
-
6
).
[2
5
]
A
b
d
u
l
A
M
,
Um
a
r
S
.
“
A
tt
a
c
k
s
o
f
De
n
ial
-
of
-
S
e
rv
ice
o
n
Ne
tw
o
rk
s
La
y
e
r
o
f
OSI
M
o
d
e
l
a
n
d
M
a
i
n
tain
i
n
g
o
f
S
e
c
u
rit
y
”
.
In
d
o
n
e
sia
n
J
o
u
rn
a
l
o
f
El
e
c
trica
l
En
g
i
n
e
e
rin
g
a
n
d
C
o
mp
u
ter
S
c
ien
c
e
(
I
J
EE
CS
)
.
2
0
1
7
Ja
n
1
;
5
(1
):
1
8
1
-
6.
Evaluation Warning : The document was created with Spire.PDF for Python.