ICMPv6-based DoS and DDoS attacks and defense mechanisms

OE Elejla, M Anbar, B Belaton - IETE Technical Review, 2017 - Taylor & Francis
The number of internet users and devices that are in need for more IP addresses to be
assigned to them is rapidly increasing. A new protocol named IPv6 was developed in 1998 …

[KİTAP][B] IT-Sicherheit: Konzepte–Verfahren–Protokolle

C Eckert - 2013 - degruyter.com
Literaturverzeichnis Page 1 Literaturverzeichnis [1] 3GPP. Design of the UMTS Cipher and
Integrity Functions. [2] 3GPP. UMTS Security Architecture. [3] Martın Abadi and Roger M …

Efficacy of tcp/ip over atm architecture using network slicing in 5g environment

AB Pawar, MA Jawale, P William… - Smart Data Intelligence …, 2022 - Springer
The rapid advances in ATM technology will trigger a lot of new opportunities for value-added
services. An industry standard for linking computers and networks is known as transmission …

Deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks

OE Elejla, M Anbar, S Hamouda, S Faisal… - Applied Sciences, 2022 - mdpi.com
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol
version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control …

[PDF][PDF] Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review

AHB Alghuraibawi, R Abdullah, S Manickam… - International Journal of …, 2021 - academia.edu
Security network systems have been an increasingly important discipline since the
implementation of preliminary stages of Internet Protocol version 6 (IPv6) for exploiting by …

IPV4/IPV6 security and threat comparisons

E Durdağı, A Buldu - Procedia-Social and Behavioral Sciences, 2010 - Elsevier
Internet using is increasing rapidly. İnternet occured as a result of commincating nodes with
each. New internet users are joining to this structure and development of it is going on. In …

A machine learning approach to detect router advertisement flooding attacks in next-generation IPv6 networks

M Anbar, R Abdullah, BN Al-Tamimi, A Hussain - Cognitive Computation, 2018 - Springer
Router advertisement (RA) flooding attack aims to exhaust all node resources, such as CPU
and memory, attached to routers on the same link. A biologically inspired machine learning …

Labelled Dataset on Distributed Denial‐of‐Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6)

S Manickam, AHB AIghuraibawi… - Wireless …, 2022 - Wiley Online Library
The most dangerous attack against IPv6 networks today is a distributed denial‐of‐service
(DDoS) attack using Internet Control Message Protocol version 6 (ICMPv6) messages. Many …

SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things

S Raza, T Helgason, P Papadimitratos… - Future Generation …, 2017 - Elsevier
Abstract Constrained Application Protocol (CoAP) has become the de-facto web standard for
the IoT. Unlike traditional wireless sensor networks, Internet-connected smart thing …

Review of security vulnerabilities in the IPv6 neighbor discovery protocol

M Anbar, R Abdullah, RMA Saad, E Alomari… - Information Science and …, 2016 - Springer
Abstract Internet Protocol version 6 (IPv6) contains a new protocol, Neighbor Discovery
Protocol (NDP), that replaces Address Resolution Protocol (ARP) in Internet Protocol version …