2018
DOI: 10.1007/s13369-018-3149-7
|View full text |Cite
|
Sign up to set email alerts
|

Flow-Based IDS for ICMPv6-Based DDoS Attacks Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 30 publications
(30 citation statements)
references
References 27 publications
0
28
0
Order By: Relevance
“…Next, locally weighted learning, discussed in sub-section D, is used to classify NDP messages. The work of Elejla et al, [17] is used as a benchmark, by adopting their flow-based data representation, model development method and evaluation metrics. Figure 4: Flowchart of the proposed model.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Next, locally weighted learning, discussed in sub-section D, is used to classify NDP messages. The work of Elejla et al, [17] is used as a benchmark, by adopting their flow-based data representation, model development method and evaluation metrics. Figure 4: Flowchart of the proposed model.…”
Section: Methodsmentioning
confidence: 99%
“…Consequently, this saturates the victim's network bandwidth, which leads to the unavailability of the network to its legitimate users [4]. Deploying a Network IDS (NIDS) at the default gateway of IPv6 network tends to curb DDoS attacks [17] as it captures packets passing through the network, and analyses them for the purpose of detecting DDoS attacks. The method of representation of the network traffic determines the performance of NIDS.…”
Section: ) Ndp-based Ddos Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…The result of experiments shows that with 0.26 RMSE, the model offered a high DA of 98.3 percent. However, the key drawback of the model is the sole detection of the ICMPv6 Echo-Request flooding attack [52]. Moreover, the size of the datasets of 2000 ICMPv6 Echo-Request packets cannot reflect the actual behavior of the DDoS attack [53].…”
Section: Consmentioning
confidence: 99%