2022
DOI: 10.1155/2022/8060333
|View full text |Cite
|
Sign up to set email alerts
|

Labelled Dataset on Distributed Denial-of-Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6)

Abstract: The most dangerous attack against IPv6 networks today is a distributed denial-of-service (DDoS) attack using Internet Control Message Protocol version 6 (ICMPv6) messages. Many ICMPv6-DDoS attack detection mechanisms rely on self-created datasets because very few suitable ICMPv6-DDoS attack datasets are publicly available due to privacy and security concerns. When implemented in a real network, however, a detection system that relies on a dataset with incorrect packet or flow representation and contains unqual… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…The cited references were using a similar tool to generate the intrusions, but different in the terms of detection model. Figure 5 showed the comparison between this agent's accuracy with the model from the article [27]. Based on the result of Figure 5, this study compared several algorithms like support vector machine (SVM), naive Bayes (NB), decision tree (DT), k-nearest neighbor (KNN), neural network (NN), and epsilon greedy optimized Q learning (EG-QL).…”
Section: Resultsmentioning
confidence: 99%
“…The cited references were using a similar tool to generate the intrusions, but different in the terms of detection model. Figure 5 showed the comparison between this agent's accuracy with the model from the article [27]. Based on the result of Figure 5, this study compared several algorithms like support vector machine (SVM), naive Bayes (NB), decision tree (DT), k-nearest neighbor (KNN), neural network (NN), and epsilon greedy optimized Q learning (EG-QL).…”
Section: Resultsmentioning
confidence: 99%
“…This method can handle data features that are linearly and nonlinearly dependent. In [22], Manickam et al created a comprehensive ICMPv6-DDoS attack dataset to detect ICMPv6-DDoS attacks. They tested the dataset on five machine learning models, and the suggested dataset accurately represented attack traffic, with a high detection accuracy and low false-positive rate.…”
Section: Related Workmentioning
confidence: 99%
“…A dataset must include both normal and abnormal traffic data representing diverse scenarios, as well as all important and relevant features labelled. Therefore, [22] the dataset that contains the ICMPv6 DDoS attacker will be used…”
Section: Intrusion Detection System (Ids) For Icmpv6mentioning
confidence: 99%
“…• The proposed method employs a wrapper method in features selection technology to generate optimal subset features for detecting ICMPv6 flooding attacks, with the Support Vector Machine (SVM) used for evaluation. • Experiments were carried out to evaluate the performance of the proposed method, which is demonstrated by using datasets generated in a NAv6 laboratory [22].…”
Section: Introductionmentioning
confidence: 99%