ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: A review
Although the launch of Internet Protocol version six (IPv6) addressed the issue of IPv4's
address depletion, but also mandated the use of Internet Control Message Protocol version …
address depletion, but also mandated the use of Internet Control Message Protocol version …
[HTML][HTML] Deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol
version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control …
version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control …
Flow-based approach to detect abnormal behavior in neighbor discovery protocol (NDP)
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …
[图书][B] Multi-fractal traffic and anomaly detection in computer communications
M Li - 2022 - taylorfrancis.com
This book provides a comprehensive theory of mono-and multi-fractal traffic, including the
basics of long-range dependent time series and 1/f noise, ergodicity and predictability of …
basics of long-range dependent time series and 1/f noise, ergodicity and predictability of …
[PDF][PDF] Investigating security issues and preventive mechanisms in IPv6 deployment
JS Nixon, M Amenu - Int. J, 2022 - researchgate.net
Internet Protocols are utilized to empower the communication between the computing
devices in the computer networks. IPv6 offers additional address space and more …
devices in the computer networks. IPv6 offers additional address space and more …
Neighbor discovery protocol anomaly-based detection system using neural network algorithm
The exponential increase in Internet-facing devices in the last decade has resulted in IP
address exhaustion due to the limitations of the existing IPv4 address space. Therefore, the …
address exhaustion due to the limitations of the existing IPv4 address space. Therefore, the …
[PDF][PDF] IPv6 cryptographically generated address: Analysis, optimization and protection
In networking, one major difficulty that nodes suffer from is the need for their addresses to be
generated and verified without relying on a third party or public authorized servers. To …
generated and verified without relying on a third party or public authorized servers. To …
Modelling and evaluation of network intrusion detection systems using machine learning techniques
RN Clottey, W Yaokumah, JK Appati - International Journal of …, 2021 - igi-global.com
This study aims at modelling and evaluating the performance of machine learning
techniques on a recent network intrusion dataset. Five machine learning algorithms, which …
techniques on a recent network intrusion dataset. Five machine learning algorithms, which …
[PDF][PDF] Hybridized Decision Tree methods for Detecting Generic Attack on Ciphertext
YA Alsariera - International Journal of Computer Science & …, 2021 - researchgate.net
The surge in generic attacks execution against cipher text on the computer network has led
to the continuous advancement of the mechanisms to protect information integrity and …
to the continuous advancement of the mechanisms to protect information integrity and …
Network intrusion detection in internet of things (IoT): a systematic review
W Yaokumah, RN Clottey, JK Appati - International Journal of Smart …, 2021 - igi-global.com
The open nature of the internet of things network makes it vulnerable to cyber-attacks.
Intrusion detection systems aid in detecting and preventing such attacks. This paper offered …
Intrusion detection systems aid in detecting and preventing such attacks. This paper offered …