2015
DOI: 10.1080/02564602.2015.1098576
|View full text |Cite
|
Sign up to set email alerts
|

An Intelligent ICMPv6 DDoS Flooding-Attack Detection Framework (v6IIDS) using Back-Propagation Neural Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 33 publications
(24 citation statements)
references
References 9 publications
0
24
0
Order By: Relevance
“…More so, the tools used in carrying out this form of attack are very easily obtainable, in fact a compromised machine used to send packets to victim might not be aware that it is being compromised, which makes the attacks quite frequent. Maintaining a simple structure of many-to-one features as depicted in Figure 1, DDoS attacks are complex to detect or resolve and can wreck a terrible impact on attacked network or device as attackers remain hidden through the usage of IP spoofing while executing this deadly attack [12].…”
Section: A Distributed Denial Of Service Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…More so, the tools used in carrying out this form of attack are very easily obtainable, in fact a compromised machine used to send packets to victim might not be aware that it is being compromised, which makes the attacks quite frequent. Maintaining a simple structure of many-to-one features as depicted in Figure 1, DDoS attacks are complex to detect or resolve and can wreck a terrible impact on attacked network or device as attackers remain hidden through the usage of IP spoofing while executing this deadly attack [12].…”
Section: A Distributed Denial Of Service Attackmentioning
confidence: 99%
“…The Neighbour Discovery Protocol is a network layer protocol that enables communication on local links. It carries out its functions solely depending on ICMPv6 by making use of five different types of ICMPv6 informational messages, sent by nodes and routers [12]. A typical task of NDP is to facilitate the auto generation of the IPv6 address for a node, often referred to as "Plug and Play" and also to enable the exchange of NDP messages between nodes [12].…”
Section: ) Neighbour Discovery Protocol (Ndp)mentioning
confidence: 99%
“…In order to acquire access of the internal network, the attackers may utilize malware. Saad et al (2015) mentioned that a research, which included respondents from 130 organizations, was held in 2012 for the purpose of recognizing the security concerns of organizations like those related to internal IPv6 networks. In accordance with 70% of the respondent, we came to know that DoS attacks were amongst their IPv6 security concerns.…”
Section: Dos Attacks On Internal Networkmentioning
confidence: 99%
“…The malicious node uses a spoofed message stating that it has the address in answer to every DAD attempt. Consequently, the victim will fail to access the network or configure an IP address because every attempt to generate a new valid IPv6 will not pass the address collision check successfully [16].…”
Section: ) Redirectmentioning
confidence: 99%