2016
DOI: 10.1007/s00521-016-2812-8
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection Systems of ICMPv6-based DDoS attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 29 publications
(29 citation statements)
references
References 27 publications
0
29
0
Order By: Relevance
“…Moreover, considering the importance of DoS and DDoS threats using ICMPv6 messages in the IPv6 network, several other classifications have been proposed by researchers such as [6], [7], and [8]. Based on the ML approaches, existing ML-based IDS models can be categorized into two classes as single or hybrid for the detection of ICMPv6-based DoS and DDoS attacks.…”
Section: Existing Ml-based Ids Models Detecting Icmpv6-based Dos mentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, considering the importance of DoS and DDoS threats using ICMPv6 messages in the IPv6 network, several other classifications have been proposed by researchers such as [6], [7], and [8]. Based on the ML approaches, existing ML-based IDS models can be categorized into two classes as single or hybrid for the detection of ICMPv6-based DoS and DDoS attacks.…”
Section: Existing Ml-based Ids Models Detecting Icmpv6-based Dos mentioning
confidence: 99%
“…In literature, existing reviews on proposed IDSs for ICMPv6-based DoS and DDoS attacks detection problem has either focused on general defensive mechanisms (detection and prevention) or intrusion detection systems built on signature or anomaly-based detection approaches, as reviewed by Elejla et al [6], [7], and Bdair et al [8]. In general, Anomaly-based Detection (AD) builds a benign profile of network behavior by observing normal events in the network and any deviation produces an alert as a possible intrusion.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Elejila et al, in 2016 examined intrusion detection systems designed to thwart ICMPv6-based DDoS attacks. [22]. In this work, they considered existing vulnerabilities in ICMPv6 and how these could be exploited to launch DDoS attacks.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…The attacker changes a captured message transmitted between two nodes. For instance, this attack could occur when Host B tries to communicate with Host A, where, to obtain the physical address of Host B, Host A transmits a Neighbour Solicitation message [17].…”
Section: ) Redirectmentioning
confidence: 99%