Proceedings of the 16th International Joint Conference on E-Business and Telecommunications 2019
DOI: 10.5220/0007840104080416
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Intrusion Detection Systems in IPv6 Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Snort can also be easily extended via plugins with other inspectors and rule options. The neighbor discovery protocol inspector indp [70], for example, detects attacks on the IPv6 neighbor discovery protocol [71].…”
Section: Snort Configurationmentioning
confidence: 99%
“…Snort can also be easily extended via plugins with other inspectors and rule options. The neighbor discovery protocol inspector indp [70], for example, detects attacks on the IPv6 neighbor discovery protocol [71].…”
Section: Snort Configurationmentioning
confidence: 99%
“…Snort can also be easily extended via plugins with other inspectors and rule options. The neighbor discovery protocol inspector indp 9 for example detects attacks on the IPv6 neighbor discovery protocol [63].…”
Section: Snort Configurationmentioning
confidence: 99%
“…IDS software is widely used to detect potential attacks through the classification algorithms that are commonly used to build accurate IDSs due to their efficiency and autolearning ability to detect ICMPv6-based DDoS attacks [47,48]. In addition, IDS uses a benchmark dataset for the evaluation of intrusion detection systems in IPv6 environments, and evaluation through the accuracy in detecting IPv6 attacks [36].…”
Section: Intrusion Detection System (Ids) For Icmpv6mentioning
confidence: 99%