Overview of IPv6 based DDoS and DoS attacks detection mechanisms
In recent years, the number of Internet users and devices are rapidly increased. For this
reason, the Internet Assigned Number Authority (IANA) launched a new protocol called …
reason, the Internet Assigned Number Authority (IANA) launched a new protocol called …
Eth-PSD: A machine learning-based phishing scam detection approach in ethereum
Recently, the rapid flourish of blockchain technology in the financial field has attracted many
cybercriminals' attention to launching blockchain-based attacks such as ponzi schemes …
cybercriminals' attention to launching blockchain-based attacks such as ponzi schemes …
[PDF][PDF] Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review
AHB Alghuraibawi, R Abdullah, S Manickam… - International Journal of …, 2021 - academia.edu
Security network systems have been an increasingly important discipline since the
implementation of preliminary stages of Internet Protocol version 6 (IPv6) for exploiting by …
implementation of preliminary stages of Internet Protocol version 6 (IPv6) for exploiting by …
[PDF][PDF] Feature Selection for Detecting ICMPv6-Based DDoS Attacks Using Binary Flower Pollination Algorithm.
AHB Aighuraibawi, S Manickam, R Abdullah… - Comput. Syst. Sci …, 2023 - researchgate.net
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4× 1038 unique
IP addresses of devices in the network. IPv6 has introduced new features like Neighbour …
IP addresses of devices in the network. IPv6 has introduced new features like Neighbour …
Comparison of classification algorithms on ICMPv6-based DDoS attacks detection
Computer networks are aimed to be secured from any potential attacks. Intrusion Detection
systems (IDS) are a popular software to detect any possible attacks. Among the mechanisms …
systems (IDS) are a popular software to detect any possible attacks. Among the mechanisms …
Hybrid fuzzy integrated convolutional neural network (HFICNN) for similarity feature recognition problem in abnormal netflow detection
X Yue, J Wang, W Huang - Neurocomputing, 2020 - Elsevier
This paper presents a hybrid fuzzy integrated convolutional neural network (HFICNN) to
deal with the similarity feature recognition problem in abnormal netflow detection, which is …
deal with the similarity feature recognition problem in abnormal netflow detection, which is …
Brief of intrusion detection systems in detecting ICMPv6 attacks
AH Bdair, R Abdullah, S Manickam… - … Science and Technology …, 2020 - Springer
Network security, amongst other security issues, essentially requires implementing Internet
Protocol version 6 (IPv6). Cybercriminals always hunted for methods and means to unfairly …
Protocol version 6 (IPv6). Cybercriminals always hunted for methods and means to unfairly …
[PDF][PDF] Investigating security issues and preventive mechanisms in IPv6 deployment
JS Nixon, M Amenu - Int. J, 2022 - researchgate.net
Internet Protocols are utilized to empower the communication between the computing
devices in the computer networks. IPv6 offers additional address space and more …
devices in the computer networks. IPv6 offers additional address space and more …
Modified flower pollination algorithm for ICMPv6-based DDoS attacks anomaly detection
AHB AIghuraibawi, S Manickam, R Abdullah… - Procedia Computer …, 2023 - Elsevier
Abstract Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4* 10
38 unique IP addresses of devices in the network. IPv6 needed a number of protocols such …
38 unique IP addresses of devices in the network. IPv6 needed a number of protocols such …
Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection
Internet Protocol version 6 (IPv6) and its core protocol, Internet Control Message Protocol
version 6 (ICMPv6), need to be secured from attacks, such as Denial of Service (DoS) and …
version 6 (ICMPv6), need to be secured from attacks, such as Denial of Service (DoS) and …