2018
DOI: 10.1007/s00521-017-3319-7
|View full text |Cite
|
Sign up to set email alerts
|

Labeled flow-based dataset of ICMPv6-based DDoS attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 13 publications
0
15
0
Order By: Relevance
“…The monitoring devices capture all inbound and outbound network traffic (including payload and header) without filtration and packet loss. The monitoring devices capture the packets as representing the actual network traffic [33]. The most common network traffic capturing software is TCP-Dump [34] and WireShark [35], which are typically placed at the edge point of the network.…”
Section: ) Packet-based Network Trafficmentioning
confidence: 99%
“…The monitoring devices capture all inbound and outbound network traffic (including payload and header) without filtration and packet loss. The monitoring devices capture the packets as representing the actual network traffic [33]. The most common network traffic capturing software is TCP-Dump [34] and WireShark [35], which are typically placed at the edge point of the network.…”
Section: ) Packet-based Network Trafficmentioning
confidence: 99%
“…However, their work was proposed and developed based on the unidirectional flow concept and limited the type of network attack to the cyclostationarity-related attack such as SSH scan attack and SPAM attack. Elejla et al [17] also presented a dataset for ICMPv6 DDoS attack detection. The dataset was created and modeled using unidirectional flow features, which replicated the campus network traffic.…”
Section: Traffic Modeling and Its Application In Dataset Genera-mentioning
confidence: 99%
“…The intrusion dataset containing both normal and malicious network traffic is the essential component that can be used for benchmarking the performance of an IDS. Benchmarking refers to the performance of an IDS using performance evaluation metrics results obtained during experiments after applying various data mining techniques [44]. The intrusion datasets are mostly generated in the following two ways:…”
Section: Datasetmentioning
confidence: 99%
“…Average DA of 99.5% reflected the capability to differentiate between normal and attack data using the datasets containing 250,008 records. Though the authors have claimed high DA, the proposed technique is only limited to floodingbased DoS attacks using RA messages of NDP [44]. In addition, less detail about the experimental environment and attack tools is given.…”
Section: B Single Classifier-based Ids 1) Packet Features-based Idssmentioning
confidence: 99%
See 1 more Smart Citation