Also found in: Dictionary, Encyclopedia.
SLAACStateless Address Auto-configuration
SLAACSystem Level Applications of Adaptive Computing
Copyright 1988-2018, All rights reserved.
References in periodicals archive ?
SLAAC: in SLAAC attack [26], the node can obtain an IPv6 address by combining its own MAC address and network prefix according to "EUI-64." Thus, the attack node can use the characteristics of SLAAC by combining the network prefix and source MAC address in the [NS.sub.hash-targetAdd-DAD] to infer the destination address of DAD.
For a SLAAC attack, the address is formed by EUI-64 method [27].
Thus, SLAAC attack does not work anymore, and the ACSP of the subsequent HSEC-Target-DAD process gradually increases and approaches to the ACSP of pseudocollision attack.
Parvez, "Optimizing security and address configuration in IPv6 SLAAC," in Proceedings of the 11th International Conference on Communication Networks, ICCN 2015, pp.
Ong, "IPv6 stateless address autoconfiguration (SLAAC) attacks and detection," in Proceedings of the DLSU Research Congress, vol.