Covert channel detection: machine learning approaches

MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …

[PDF][PDF] Feature Selection for Detecting ICMPv6-Based DDoS Attacks Using Binary Flower Pollination Algorithm.

AHB Aighuraibawi, S Manickam, R Abdullah… - Comput. Syst. Sci …, 2023 - researchgate.net
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4× 1038 unique
IP addresses of devices in the network. IPv6 has introduced new features like Neighbour …

[PDF][PDF] Q-learning based distributed denial of service detection

HS Yaseen, A Al-Saadi - International Journal of Electrical and Computer …, 2023 - core.ac.uk
Distributed denial of service (DDoS) attacks the target service providers by sending a huge
amount of traffic to prevent legitimate users from getting the service. These attacks become …

Efficient model for detecting application layer distributed denial of service attacks

MK Kareem, OD Aborisade, SA Onashoga… - Bulletin of Electrical …, 2023 - beei.org
The increasing advancement of technologies and communication infrastructures has been
posing threats to the internet services. One of the most powerful attack weapons for …

Neighbor discovery protocol anomaly-based detection system using neural network algorithm

RMA Saad, M Anbar, S Manickam, SI Shaheen… - International Journal of …, 2024 - Springer
The exponential increase in Internet-facing devices in the last decade has resulted in IP
address exhaustion due to the limitations of the existing IPv4 address space. Therefore, the …

Predicting DoS and DDoS attacks in network security scenarios using a hybrid deep learning model

AF Al-zubidi, AK Farhan, SM Towfek - Journal of Intelligent Systems, 2024 - degruyter.com
Network security faces increasing threats from denial of service (DoS) and distributed denial
of service (DDoS) attacks. The current solutions have not been able to predict and mitigate …

[PDF][PDF] 'Improved heuristic framework for cyber security system on DDoS attack

R Ahuja, M Gupta - J. Data Acquisition Process, 2023 - sjcjycl.cn
Nowadays, networks have adopted the always-connected concept and as time goes on,
technology makes gadgets smaller and cheaper. This revolution lays the foundations for the …

LMIPv6ATK: A Labeled dataset containing multiple ICMPV6-DDOS attacks

S Li, L Zhang, Y Han - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Distributed denial-of-service attacks using Internet Control Message Protocol version 6
messages can cause serious damage to IPV6 networks, resulting in huge economic losses …

DDoS Capability and Readiness-Evidence from Australian Organisations

IB Wiltshire, S Adapa, DJ Paul - 2023 - rune.une.edu.au
A common perception of cyber defence is that it should protect systems and data from
malicious attacks, ideally keeping attackers outside of secure perimeters and preventing …