2015 5th International Conference on IT Convergence and Security (ICITCS) 2015
DOI: 10.1109/icitcs.2015.7293014
|View full text |Cite
|
Sign up to set email alerts
|

Reliable Behavioral Dataset for IPv6 Neighbor Discovery Protocol Investigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Flooding attack : In this attack, the attacker floods the network with fake NS messages, which can cause drones to become unresponsive or even crash. This can disrupt communication on the network and prevent legitimate drones from connecting 44 …”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Flooding attack : In this attack, the attacker floods the network with fake NS messages, which can cause drones to become unresponsive or even crash. This can disrupt communication on the network and prevent legitimate drones from connecting 44 …”
Section: Related Workmentioning
confidence: 99%
“…Table 1 summarizes key schemes that secure the DAD process from various DoS attacks. Cryptographic methods 25,42–45,47,50,51,53,56,59 aim to hide the details of the DAD process to make it harder for adversary nodes to attack it. Still, they involve complex cryptographic techniques unsuitable for resource‐constrained environments.…”
Section: Related Workmentioning
confidence: 99%
“…Dataset presented in [30] is selected in testing and evaluations as it successfully captures the normal behavioral of NDP, and capture RA and NS flooding attacks which make it good selection choice. Table 1 summarizes the summation of captured packets inside the dataset.…”
Section: Datasetmentioning
confidence: 99%
“…Hence, the aggregated traffic's correctness cannot be determined. As indicated in [24,25], "datasets in the intrusion detection domain have been widely criticized for their accuracy and capacity to reflect real-world settings. "…”
Section: Introductionmentioning
confidence: 99%