A systematic literature review on machine learning and deep learning approaches for detecting DDoS attacks in software-defined networking
Software-defined networking (SDN) is a revolutionary innovation in network technology with
many desirable features, including flexibility and manageability. Despite those advantages …
many desirable features, including flexibility and manageability. Despite those advantages …
ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: A review
Although the launch of Internet Protocol version six (IPv6) addressed the issue of IPv4's
address depletion, but also mandated the use of Internet Control Message Protocol version …
address depletion, but also mandated the use of Internet Control Message Protocol version …
Deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol
version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control …
version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control …
Applicability of intrusion detection system on Ethereum attacks: a comprehensive review
For many reasons, Ethereum attracts more investors, researchers, and even scammers; this
is the first platform that enables the new Decentralized Applications (DApps) to run on top of …
is the first platform that enables the new Decentralized Applications (DApps) to run on top of …
Flow-based approach to detect abnormal behavior in neighbor discovery protocol (NDP)
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …
Smart IDS and IPS for cyber-physical systems
One of the most important requirements is security and accessibility efforts which are
represented as a critical issue that should be considered in many applications for the …
represented as a critical issue that should be considered in many applications for the …
Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection
Internet Protocol version 6 (IPv6) and its core protocol, Internet Control Message Protocol
version 6 (ICMPv6), need to be secured from attacks, such as Denial of Service (DoS) and …
version 6 (ICMPv6), need to be secured from attacks, such as Denial of Service (DoS) and …
Propose a flow-based approach for detecting abnormal behavior in neighbor discovery protocol (NDP)
Abstract Neighbour Discovery Protocol is vulnerable to various attacks, such as DoS
flooding attack that uses excessive amount of Router Advertisement (RA) and Neighbour …
flooding attack that uses excessive amount of Router Advertisement (RA) and Neighbour …
[PDF][PDF] IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board compute
Internet of things is a technology that allows communication between devices within a
network. Since this technology depends on a network to communicate, the vulnerability of …
network. Since this technology depends on a network to communicate, the vulnerability of …
[LIBRO][B] Cybersecurity and Identity Access Management
BS Rawal, G Manogaran, A Peter - 2023 - Springer
Cybersecurity protects the computer systems' security and their hardware network from theft
or damages both the program and the electronic data. The services they provide are …
or damages both the program and the electronic data. The services they provide are …