ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: A review

M Tayyab, B Belaton, M Anbar - IEEE Access, 2020 - ieeexplore.ieee.org
Although the launch of Internet Protocol version six (IPv6) addressed the issue of IPv4's
address depletion, but also mandated the use of Internet Control Message Protocol version …

[HTML][HTML] Deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks

OE Elejla, M Anbar, S Hamouda, S Faisal… - Applied Sciences, 2022 - mdpi.com
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol
version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control …

Flow-based approach to detect abnormal behavior in neighbor discovery protocol (NDP)

AA Bahashwan, M Anbar, IH Hasbullah… - IEEE …, 2021 - ieeexplore.ieee.org
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …

[图书][B] Multi-fractal traffic and anomaly detection in computer communications

M Li - 2022 - taylorfrancis.com
This book provides a comprehensive theory of mono-and multi-fractal traffic, including the
basics of long-range dependent time series and 1/f noise, ergodicity and predictability of …

[PDF][PDF] Investigating security issues and preventive mechanisms in IPv6 deployment

JS Nixon, M Amenu - Int. J, 2022 - researchgate.net
Internet Protocols are utilized to empower the communication between the computing
devices in the computer networks. IPv6 offers additional address space and more …

Neighbor discovery protocol anomaly-based detection system using neural network algorithm

RMA Saad, M Anbar, S Manickam, SI Shaheen… - International Journal of …, 2024 - Springer
The exponential increase in Internet-facing devices in the last decade has resulted in IP
address exhaustion due to the limitations of the existing IPv4 address space. Therefore, the …

[PDF][PDF] IPv6 cryptographically generated address: Analysis, optimization and protection

AS Ahmed, R Hassan, F Qamar… - CMC Comput. Mater …, 2021 - cdn.techscience.cn
In networking, one major difficulty that nodes suffer from is the need for their addresses to be
generated and verified without relying on a third party or public authorized servers. To …

Modelling and evaluation of network intrusion detection systems using machine learning techniques

RN Clottey, W Yaokumah, JK Appati - International Journal of …, 2021 - igi-global.com
This study aims at modelling and evaluating the performance of machine learning
techniques on a recent network intrusion dataset. Five machine learning algorithms, which …

[PDF][PDF] Hybridized Decision Tree methods for Detecting Generic Attack on Ciphertext

YA Alsariera - International Journal of Computer Science & …, 2021 - researchgate.net
The surge in generic attacks execution against cipher text on the computer network has led
to the continuous advancement of the mechanisms to protect information integrity and …

Network intrusion detection in internet of things (IoT): a systematic review

W Yaokumah, RN Clottey, JK Appati - International Journal of Smart …, 2021 - igi-global.com
The open nature of the internet of things network makes it vulnerable to cyber-attacks.
Intrusion detection systems aid in detecting and preventing such attacks. This paper offered …