ICMPv6-based DoS and DDoS attacks and defense mechanisms

OE Elejla, M Anbar, B Belaton - IETE Technical Review, 2017‏ - Taylor & Francis
The number of internet users and devices that are in need for more IP addresses to be
assigned to them is rapidly increasing. A new protocol named IPv6 was developed in 1998 …

A comparison of neural-network-based intrusion detection against signature-based detection in iot networks

M Schrötter, A Niemann, B Schnor - Information, 2024‏ - mdpi.com
Over the last few years, a plethora of papers presenting machine-learning-based
approaches for intrusion detection have been published. However, the majority of those …

Labelled Dataset on Distributed Denial‐of‐Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6)

S Manickam, AHB AIghuraibawi… - Wireless …, 2022‏ - Wiley Online Library
The most dangerous attack against IPv6 networks today is a distributed denial‐of‐service
(DDoS) attack using Internet Control Message Protocol version 6 (ICMPv6) messages. Many …

Comparative performance analysis of classification algorithms for intrusion detection system

M Anbar, R Abdullah, IH Hasbullah… - 2016 14th annual …, 2016‏ - ieeexplore.ieee.org
The ability of an intrusion detection system (IDS) to accurately detect potential attacks is
crucial in protecting network resources and data from the attack's destructive effects. Among …

Labeled flow-based dataset of ICMPv6-based DDoS attacks

OE Elejla, M Anbar, B Belaton, S Hamouda - Neural Computing and …, 2019‏ - Springer
DDoS attacks that depend on Internet Control Message Protocol version 6 (ICMPv6) are one
of the most commonly performed IPv6 attacks against today's IPv6 networks. A few detection …

{IPv6} security: Attacks and countermeasures in a nutshell

J Ullrich, K Krombholz, H Hobel, A Dabrowski… - 8th USENIX Workshop …, 2014‏ - usenix.org
The history of computers is full of underestimation: 640 kilobyte, 2-digit years, and 32-bit
Internet addresses. IPv6 was invented to overcome the latter as well as to revise other …

Novel duplicate address detection with hash function

GJ Song, ZZ Ji - PloS one, 2016‏ - journals.plos.org
Duplicate address detection (DAD) is an important component of the address resolution
protocol (ARP) and the neighbor discovery protocol (NDP). DAD determines whether an IP …

Empirical study on the efficiency of search based test generation for EFSM models

R Zhao, M Harman, Z Li - 2010 third international conference …, 2010‏ - ieeexplore.ieee.org
Experimental work in software testing has generally focused on evaluating the effectiveness
and efficiency on various source code programs. However, an important issue of testing …

An adaptive detection model for IPv6 extension header threats based on deterministic decision automaton

B Lin, L Zhang, H Zhang, Y Guo, S Ge, Y Fang… - Scientific Reports, 2024‏ - nature.com
The IPv6 extension header mechanism, a new feature of the IPv6 protocol, enhances
flexibility and scalability but introduces numerous security threats like firewall evasion and …

[HTML][HTML] Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection

OE Elejla, M Anbar, S Hamouda, B Belaton… - Symmetry, 2022‏ - mdpi.com
Internet Protocol version 6 (IPv6) and its core protocol, Internet Control Message Protocol
version 6 (ICMPv6), need to be secured from attacks, such as Denial of Service (DoS) and …