ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: A review
Although the launch of Internet Protocol version six (IPv6) addressed the issue of IPv4's
address depletion, but also mandated the use of Internet Control Message Protocol version …
address depletion, but also mandated the use of Internet Control Message Protocol version …
Match-prevention technique against denial-of-service attack on address resolution and duplicate address detection processes in IPv6 link-local network
Address Resolution (AR) and Duplicate Address Detection (DAD) are considered the most
important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from …
important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from …
[PDF][PDF] NE-CPPA: A new and efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks (VANETs)
MA Al-shareeda, M Anbar, S Manickam… - Appl …, 2020 - naturalspublishing.com
Vehicular ad-hoc networks (VANETs) are the fundamental technology for the Intelligent
Transportation System (ITS) that provides drivers with a safe and comfortable driving …
Transportation System (ITS) that provides drivers with a safe and comfortable driving …
[PDF][PDF] Ipv6 security issues: A systematic review following prisma guidelines
SA Abdullah, AA Al Ashoor - Baghdad Science Journal, 2022 - iasj.net
Since Internet Protocol version 6 is a new technology, insecure network configurations are
inevitable. The researchers contributed a lot to spreading knowledge about IPv6 …
inevitable. The researchers contributed a lot to spreading knowledge about IPv6 …
DADCNF: Diagnoser design for duplicate address detection threat using conjunctive Normal form
Abstract Duplicate Address Detection is the protocol that confirms the uniqueness of an IPv6
host′ s identification when it joins a new network. DAD scheme is susceptible to neighbor …
host′ s identification when it joins a new network. DAD scheme is susceptible to neighbor …
Flow-based approach to detect abnormal behavior in neighbor discovery protocol (NDP)
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …
Ndpsec: neighbor discovery protocol security mechanism
Internet Protocol version 6 (IPv6) is envisioned as the cornerstone for future internet
connectivity and information technology (IT) expansion. Due to its enormous address pool …
connectivity and information technology (IT) expansion. Due to its enormous address pool …
IPv6 addressing with hidden duplicate address detection to mitigate denial of service attacks in the internet of drone
The fusion of drones with the Internet, termed the Internet of Drones (IoD), resembles the
Internet of Things (IoT) paradigm. In IoD, drones necessitate unique identifiers similar to IPv6 …
Internet of Things (IoT) paradigm. In IoD, drones necessitate unique identifiers similar to IPv6 …
DAD-match; Security technique to prevent denial of service attack on duplicate address detection process in IPv6 link-local network
An efficiently unlimited address space is provided by Internet Protocol version 6 (IPv6). It
aims to accommodate thousands of hundreds of unique devices on a similar link. This can …
aims to accommodate thousands of hundreds of unique devices on a similar link. This can …
Brief of intrusion detection systems in detecting ICMPv6 attacks
AH Bdair, R Abdullah, S Manickam… - … Science and Technology …, 2020 - Springer
Network security, amongst other security issues, essentially requires implementing Internet
Protocol version 6 (IPv6). Cybercriminals always hunted for methods and means to unfairly …
Protocol version 6 (IPv6). Cybercriminals always hunted for methods and means to unfairly …