ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: A review
Although the launch of Internet Protocol version six (IPv6) addressed the issue of IPv4's
address depletion, but also mandated the use of Internet Control Message Protocol version …
address depletion, but also mandated the use of Internet Control Message Protocol version …
A comprehensive deep learning benchmark for IoT IDS
The significance of an intrusion detection system (IDS) in networks security cannot be
overstated in detecting and responding to malicious attacks. Failure to detect large-scale …
overstated in detecting and responding to malicious attacks. Failure to detect large-scale …
A deep learning ensemble approach to detecting unknown network attacks
The majority of the intrusion detection solutions proposed using machine learning and deep
learning approaches are based on known attack classes only. Comprehensive threat …
learning approaches are based on known attack classes only. Comprehensive threat …
[HTML][HTML] Hybridizing flower pollination algorithm with particle swarm optimization for enhancing the performance of IPv6 intrusion detection system
AHB Aighuraibawi, S Manickam, ZAA Alyasseri… - Alexandria Engineering …, 2024 - Elsevier
Abstract Internet Protocol version 6 (IPv6) is the most recent iteration of IP, designed to
accommodate hundreds of thousands of devices with unique IP addresses. IPv6 introduces …
accommodate hundreds of thousands of devices with unique IP addresses. IPv6 introduces …
[PDF][PDF] Feature Selection for Detecting ICMPv6-Based DDoS Attacks Using Binary Flower Pollination Algorithm.
AHB Aighuraibawi, S Manickam, R Abdullah… - Comput. Syst. Sci …, 2023 - researchgate.net
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4× 1038 unique
IP addresses of devices in the network. IPv6 has introduced new features like Neighbour …
IP addresses of devices in the network. IPv6 has introduced new features like Neighbour …
Labelled Dataset on Distributed Denial‐of‐Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6)
S Manickam, AHB AIghuraibawi… - Wireless …, 2022 - Wiley Online Library
The most dangerous attack against IPv6 networks today is a distributed denial‐of‐service
(DDoS) attack using Internet Control Message Protocol version 6 (ICMPv6) messages. Many …
(DDoS) attack using Internet Control Message Protocol version 6 (ICMPv6) messages. Many …
Deep learning approach for detecting router advertisement flooding-based DDoS attacks
The proliferation of connected devices under the Internet of things makes the adoption of
Internet protocol version 6 (IPv6) is occurring faster and become more needed. It was …
Internet protocol version 6 (IPv6) is occurring faster and become more needed. It was …
Comparison of classification algorithms on ICMPv6-based DDoS attacks detection
Computer networks are aimed to be secured from any potential attacks. Intrusion Detection
systems (IDS) are a popular software to detect any possible attacks. Among the mechanisms …
systems (IDS) are a popular software to detect any possible attacks. Among the mechanisms …
DADCNF: Diagnoser design for duplicate address detection threat using conjunctive Normal form
Abstract Duplicate Address Detection is the protocol that confirms the uniqueness of an IPv6
host′ s identification when it joins a new network. DAD scheme is susceptible to neighbor …
host′ s identification when it joins a new network. DAD scheme is susceptible to neighbor …
Flow-based approach to detect abnormal behavior in neighbor discovery protocol (NDP)
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …