Intrusion detection systems of ICMPv6-based DDoS attacks
Abstract Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are thorny
and a grave problem of today's Internet, resulting in economic damages for organizations …
and a grave problem of today's Internet, resulting in economic damages for organizations …
Deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol
version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control …
version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control …
[PDF][PDF] Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review
AHB Alghuraibawi, R Abdullah, S Manickam… - International Journal of …, 2021 - academia.edu
Security network systems have been an increasingly important discipline since the
implementation of preliminary stages of Internet Protocol version 6 (IPv6) for exploiting by …
implementation of preliminary stages of Internet Protocol version 6 (IPv6) for exploiting by …
Detecting network cyber-attacks using an integrated statistical approach
Anomaly detection in the Internet of Things (IoT) is imperative to improve its reliability and
safety. Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the critical …
safety. Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the critical …
[HTML][HTML] DDOS-attacks detection using an efficient measurement-based statistical mechanism
A monitoring mechanism is vital for detecting malicious attacks against cyber systems.
Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the most important …
Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the most important …
Flow-based IDS for ICMPv6-based DDoS attacks detection
Abstract The Internet Control Message Protocol version Six (ICMPv6) is categorized as the
most important part of the Internet Protocol version Six (IPv6) due to its core functionalities …
most important part of the Internet Protocol version Six (IPv6) due to its core functionalities …
Comparison of classification algorithms on ICMPv6-based DDoS attacks detection
Computer networks are aimed to be secured from any potential attacks. Intrusion Detection
systems (IDS) are a popular software to detect any possible attacks. Among the mechanisms …
systems (IDS) are a popular software to detect any possible attacks. Among the mechanisms …
Comparative performance analysis of classification algorithms for intrusion detection system
M Anbar, R Abdullah, IH Hasbullah… - 2016 14th annual …, 2016 - ieeexplore.ieee.org
The ability of an intrusion detection system (IDS) to accurately detect potential attacks is
crucial in protecting network resources and data from the attack's destructive effects. Among …
crucial in protecting network resources and data from the attack's destructive effects. Among …
Labeled flow-based dataset of ICMPv6-based DDoS attacks
DDoS attacks that depend on Internet Control Message Protocol version 6 (ICMPv6) are one
of the most commonly performed IPv6 attacks against today's IPv6 networks. A few detection …
of the most commonly performed IPv6 attacks against today's IPv6 networks. A few detection …
Hybrid fuzzy integrated convolutional neural network (HFICNN) for similarity feature recognition problem in abnormal netflow detection
X Yue, J Wang, W Huang - Neurocomputing, 2020 - Elsevier
This paper presents a hybrid fuzzy integrated convolutional neural network (HFICNN) to
deal with the similarity feature recognition problem in abnormal netflow detection, which is …
deal with the similarity feature recognition problem in abnormal netflow detection, which is …