A systematic literature review on machine learning and deep learning approaches for detecting DDoS attacks in software-defined networking

AA Bahashwan, M Anbar, S Manickam, TA Al-Amiedy… - Sensors, 2023 - mdpi.com
Software-defined networking (SDN) is a revolutionary innovation in network technology with
many desirable features, including flexibility and manageability. Despite those advantages …

ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: A review

M Tayyab, B Belaton, M Anbar - IEEE Access, 2020 - ieeexplore.ieee.org
Although the launch of Internet Protocol version six (IPv6) addressed the issue of IPv4's
address depletion, but also mandated the use of Internet Control Message Protocol version …

Deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks

OE Elejla, M Anbar, S Hamouda, S Faisal… - Applied Sciences, 2022 - mdpi.com
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol
version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control …

Applicability of intrusion detection system on Ethereum attacks: a comprehensive review

AHH Kabla, M Anbar, S Manickam, TA Al-Amiedy… - IEEE …, 2022 - ieeexplore.ieee.org
For many reasons, Ethereum attracts more investors, researchers, and even scammers; this
is the first platform that enables the new Decentralized Applications (DApps) to run on top of …

Flow-based approach to detect abnormal behavior in neighbor discovery protocol (NDP)

AA Bahashwan, M Anbar, IH Hasbullah… - IEEE …, 2021 - ieeexplore.ieee.org
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …

Smart IDS and IPS for cyber-physical systems

SA Mahboub, ESA Ahmed, RA Saeed - … intelligence paradigms for …, 2021 - igi-global.com
One of the most important requirements is security and accessibility efforts which are
represented as a critical issue that should be considered in many applications for the …

Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection

OE Elejla, M Anbar, S Hamouda, B Belaton… - Symmetry, 2022 - mdpi.com
Internet Protocol version 6 (IPv6) and its core protocol, Internet Control Message Protocol
version 6 (ICMPv6), need to be secured from attacks, such as Denial of Service (DoS) and …

Propose a flow-based approach for detecting abnormal behavior in neighbor discovery protocol (NDP)

AA Bahashwan, M Anbar, S Manickam… - … on Advances in Cyber …, 2021 - Springer
Abstract Neighbour Discovery Protocol is vulnerable to various attacks, such as DoS
flooding attack that uses excessive amount of Router Advertisement (RA) and Neighbour …

[PDF][PDF] IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board compute

AF Daru, KD Hartomo, HD Purnomo - International Journal of …, 2023 - academia.edu
Internet of things is a technology that allows communication between devices within a
network. Since this technology depends on a network to communicate, the vulnerability of …

[LIBRO][B] Cybersecurity and Identity Access Management

BS Rawal, G Manogaran, A Peter - 2023 - Springer
Cybersecurity protects the computer systems' security and their hardware network from theft
or damages both the program and the electronic data. The services they provide are …