

You have already added 0 works in your ORCID record related to the merged Research product.
You have already added 0 works in your ORCID record related to the merged Research product.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review

doi: 10.11591/ijece.v11i6.pp5216-5228 , 10.11591/ijece.v11i6.pp5351-5366 , 10.11591/ijece.v11i6.pp5160-5169 , 10.11591/ijece.v11i6.pp4932-4941 , 10.11591/ijece.v11i6.pp5266-5276 , 10.11591/ijece.v11i6.pp4850-4864 , 10.11591/ijece.v11i6.pp5342-5350 , 10.11591/ijece.v11i6.pp5049-5059 , 10.11591/ijece.v11i6.pp5170-5179 , 10.11591/ijece.v11i6.pp5530-5540 , 10.11591/ijece.v11i6.pp4942-4949 , 10.11591/ijece.v11i6.pp5240-5250 , 10.11591/ijece.v11i6.pp5137-5143 , 10.11591/ijece.v11i6.pp4810-4816 , 10.11591/ijece.v11i6.pp4718-4730 , 10.11591/ijece.v11i6.pp4634-4640 , 10.11591/ijece.v11i6.pp5153-5159 , 10.11591/ijece.v11i6.pp4785-4793 , 10.11591/ijece.v11i6.pp4708-4717 , 10.11591/ijece.v11i6.pp5251-5258 , 10.11591/ijece.v11i6.pp5197-5205 , 10.11591/ijece.v11i6.pp4922-4931 , 10.11591/ijece.v11i6.pp4610-4621 , 10.11591/ijeecs.v23.i2.pp863-870 , 10.11591/ijece.v11i6.pp4881-4890 , 10.11591/ijece.v11i6.pp5477-5487 , 10.11591/ijece.v11i6.pp5379-5389 , 10.11591/ijece.v11i6.pp5286-5291 , 10.11591/ijece.v11i6.pp5099-5106 , 10.11591/ijece.v11i6.pp4641-4648 , 10.11591/ijece.v11i6.pp5206-5215 , 10.11591/ijece.v11i6.pp5315-5326 , 10.11591/ijece.v11i6.pp5277-5285 , 10.11591/ijece.v11i6.pp5259-5265 , 10.11591/ijece.v11i6.pp4759-4766 , 10.11591/ijece.v11i6.pp%p , 10.11591/ijpeds.v12.i2.pp%p , 10.11591/ijeecs.v23.i1.pp%p
doi: 10.11591/ijece.v11i6.pp5216-5228 , 10.11591/ijece.v11i6.pp5351-5366 , 10.11591/ijece.v11i6.pp5160-5169 , 10.11591/ijece.v11i6.pp4932-4941 , 10.11591/ijece.v11i6.pp5266-5276 , 10.11591/ijece.v11i6.pp4850-4864 , 10.11591/ijece.v11i6.pp5342-5350 , 10.11591/ijece.v11i6.pp5049-5059 , 10.11591/ijece.v11i6.pp5170-5179 , 10.11591/ijece.v11i6.pp5530-5540 , 10.11591/ijece.v11i6.pp4942-4949 , 10.11591/ijece.v11i6.pp5240-5250 , 10.11591/ijece.v11i6.pp5137-5143 , 10.11591/ijece.v11i6.pp4810-4816 , 10.11591/ijece.v11i6.pp4718-4730 , 10.11591/ijece.v11i6.pp4634-4640 , 10.11591/ijece.v11i6.pp5153-5159 , 10.11591/ijece.v11i6.pp4785-4793 , 10.11591/ijece.v11i6.pp4708-4717 , 10.11591/ijece.v11i6.pp5251-5258 , 10.11591/ijece.v11i6.pp5197-5205 , 10.11591/ijece.v11i6.pp4922-4931 , 10.11591/ijece.v11i6.pp4610-4621 , 10.11591/ijeecs.v23.i2.pp863-870 , 10.11591/ijece.v11i6.pp4881-4890 , 10.11591/ijece.v11i6.pp5477-5487 , 10.11591/ijece.v11i6.pp5379-5389 , 10.11591/ijece.v11i6.pp5286-5291 , 10.11591/ijece.v11i6.pp5099-5106 , 10.11591/ijece.v11i6.pp4641-4648 , 10.11591/ijece.v11i6.pp5206-5215 , 10.11591/ijece.v11i6.pp5315-5326 , 10.11591/ijece.v11i6.pp5277-5285 , 10.11591/ijece.v11i6.pp5259-5265 , 10.11591/ijece.v11i6.pp4759-4766 , 10.11591/ijece.v11i6.pp%p , 10.11591/ijpeds.v12.i2.pp%p , 10.11591/ijeecs.v23.i1.pp%p
Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review
Security network systems have been an increasingly important discipline since the implementation of preliminary stages of Internet Protocol version 6 (IPv6) for exploiting by attackers. IPv6 has an improved protocol in terms of security as it brought new functionalities, procedures, i.e., Internet Control Message Protocol version 6 (ICMPv6). The ICMPv6 protocol is considered to be very important and represents the backbone of the IPv6, which is also responsible to send and receive messages in IPv6. However, IPv6 Inherited many attacks from the previous internet protocol version 4 (IPv4) such as distributed denial of service (DDoS) attacks. DDoS is a thorny problem on the internet, being one of the most prominent attacks affecting a network result in tremendous economic damage to individuals as well as organizations. In this paper, an exhaustive evaluation and analysis are conducted anomaly detection DDoS attacks against ICMPv6 messages, in addition, explained anomaly detection types to ICMPv6 DDoS flooding attacks in IPv6 networks. Proposed using feature selection technique based on bio-inspired algorithms for selecting an optimal solution which selects subset to have a positive impact of the detection accuracy ICMPv6 DDoS attack. The review outlines the features and protection constraints of IPv6 intrusion detection systems focusing mainly on DDoS attacks.
- Allameh Tabataba'i University Iran (Islamic Republic of)
- Annamalai University India
- Universidad de San Buenaventura, Bogota Colombia
- Dr. Ambedkar Institute of Technology India
- Islamic Azad University of Falavarjan Iran (Islamic Republic of)
White LED, CHP, Encryption, Transportation, Anomaly detection, Balanced score, Watermarking, Optimal placement, Protein-protein interaction, Offloading data, Six sigma, DFIG, Mie-scattering theory, FPGA, RGB, Routing problem, Convolution neural networks, Mobile station, Pollution, 2R1W/4R, Sudoku puzzle, Distributed algorithms, Grid connected PV inverters, Outage probability, Logistic networks, Data augmentation, Amplify-and-forward, Internal climate livestockbuildings, License plate classification, Approximation method, Smooth power output, Inception voltage, Neighbor selection, Actuator fault, Speech compression, TLS, Machine learning, 2.4 GHz, N SC, K-mean clustering, Robot manipulator, Machine-to-machine, Deep learning, Ground-to-air channel, Internet service provider, WSN, YF 3 :Er 3+ ,Yb 3+, Undirected neutrosophic graph, Smart mirror, Networks, Metro system, Pathway, EMA application, Performance expectancy, Read ports, Social influence, Non–ionizing radiation, Base telecommunication station, Route discovery, Creditworthiness assessment, Particle swarm optimization, Pontryagin's maximum principle, Hybrid vehicle, DDoS attack, DoS attack, Design, Credit scoring, Minimum spanning tree, Teaching-learning algorithm, Ant colony optimization, Image processing, Fuzzy C-means, Iterative Gaussian filtering, NDZ, PSNR, Underutilized links, HTTP post request, Energy efficiency, CPS, MQTT Broker, Gene ontology, ICMPv6, XGBoost, MANET, Internet traffic, Disease comorbidity, Islanding detection, Labeling, Bayesian optimization, Adoption risk, Energy harvesting, Tracking, Dropout, Voice recognition, Capacitor, GIS, Power control, Agile software development, Photovoltaic, IoT, Donor base station, Multi-port memory, Relaying network, Energy saving, Technology acceptance, Energy-saving, Scrum, Conductive layers, Fuzzy c-means clustering, Unmanned aerial vehicle, Random walk restart, BDX approach, Neural network, Different floors, Fuzzy logic, Distribution generator, Simscape-based model, D-STATCOM, Air-to-ground channel, Timetable optimization, Automatic detection, Bitcoins, Distributed generation, Mobile phone, El-Gamal, Adam optimizer, Deployment, Storage, Hybrid methodologies, Simulated annealing, Joint failure, Three-time-slot, Multi-hop, Wind farm, Internet management, Mesenteric cyst, Information processing, Optimal sizing, Color quality scale, Logo, Wired networks, Vehicles detection, Human phenotype ontology, Classification, Reconfiguration, Electromagnetic pollution, Convolutional neural network classification, IPv6, Sandia frequency shift, Raspberry Pi, Abdominal tumor, Torque degradation, Partial discharge, Under-water wireless sensor, Insulators, Agile methodologies, Internet gateway, Outdoor to indoor, Rotor speed control, Scrambling, Luminous flux, Coordinated planning, Chain, CT scans, NLoS
White LED, CHP, Encryption, Transportation, Anomaly detection, Balanced score, Watermarking, Optimal placement, Protein-protein interaction, Offloading data, Six sigma, DFIG, Mie-scattering theory, FPGA, RGB, Routing problem, Convolution neural networks, Mobile station, Pollution, 2R1W/4R, Sudoku puzzle, Distributed algorithms, Grid connected PV inverters, Outage probability, Logistic networks, Data augmentation, Amplify-and-forward, Internal climate livestockbuildings, License plate classification, Approximation method, Smooth power output, Inception voltage, Neighbor selection, Actuator fault, Speech compression, TLS, Machine learning, 2.4 GHz, N SC, K-mean clustering, Robot manipulator, Machine-to-machine, Deep learning, Ground-to-air channel, Internet service provider, WSN, YF 3 :Er 3+ ,Yb 3+, Undirected neutrosophic graph, Smart mirror, Networks, Metro system, Pathway, EMA application, Performance expectancy, Read ports, Social influence, Non–ionizing radiation, Base telecommunication station, Route discovery, Creditworthiness assessment, Particle swarm optimization, Pontryagin's maximum principle, Hybrid vehicle, DDoS attack, DoS attack, Design, Credit scoring, Minimum spanning tree, Teaching-learning algorithm, Ant colony optimization, Image processing, Fuzzy C-means, Iterative Gaussian filtering, NDZ, PSNR, Underutilized links, HTTP post request, Energy efficiency, CPS, MQTT Broker, Gene ontology, ICMPv6, XGBoost, MANET, Internet traffic, Disease comorbidity, Islanding detection, Labeling, Bayesian optimization, Adoption risk, Energy harvesting, Tracking, Dropout, Voice recognition, Capacitor, GIS, Power control, Agile software development, Photovoltaic, IoT, Donor base station, Multi-port memory, Relaying network, Energy saving, Technology acceptance, Energy-saving, Scrum, Conductive layers, Fuzzy c-means clustering, Unmanned aerial vehicle, Random walk restart, BDX approach, Neural network, Different floors, Fuzzy logic, Distribution generator, Simscape-based model, D-STATCOM, Air-to-ground channel, Timetable optimization, Automatic detection, Bitcoins, Distributed generation, Mobile phone, El-Gamal, Adam optimizer, Deployment, Storage, Hybrid methodologies, Simulated annealing, Joint failure, Three-time-slot, Multi-hop, Wind farm, Internet management, Mesenteric cyst, Information processing, Optimal sizing, Color quality scale, Logo, Wired networks, Vehicles detection, Human phenotype ontology, Classification, Reconfiguration, Electromagnetic pollution, Convolutional neural network classification, IPv6, Sandia frequency shift, Raspberry Pi, Abdominal tumor, Torque degradation, Partial discharge, Under-water wireless sensor, Insulators, Agile methodologies, Internet gateway, Outdoor to indoor, Rotor speed control, Scrambling, Luminous flux, Coordinated planning, Chain, CT scans, NLoS
5 Research products, page 1 of 1
- 2012IsAmongTopNSimilarDocuments
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).60 popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.Top 1% influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).Top 10% impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.Top 1% visibility views 7 download downloads 8 - 7views8downloads
Data source Views Downloads ZENODO 7 8


