2020
DOI: 10.1007/978-981-15-2693-0_11
|View full text |Cite
|
Sign up to set email alerts
|

Overview of IPv6 Based DDoS and DoS Attacks Detection Mechanisms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

4
2

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 35 publications
0
7
0
Order By: Relevance
“…In addition, IPv6 is an OSImodel-compliant network protocol layer. For this reason, the IPv6 architecture is different from the IPv4 architecture in many ways, including how packet headers are formatted, the address range (32 bits for IPv4 and 128 bits for IPv6), and other characteristics, such as autoconfiguration and mobility [5,15]. Furthermore, IPv6 requires the mandatory Internet Protocol Security (IPSec) protocol, whereas IPv4 does not.…”
Section: Ipv6 Protocol Overviewmentioning
confidence: 99%
“…In addition, IPv6 is an OSImodel-compliant network protocol layer. For this reason, the IPv6 architecture is different from the IPv4 architecture in many ways, including how packet headers are formatted, the address range (32 bits for IPv4 and 128 bits for IPv6), and other characteristics, such as autoconfiguration and mobility [5,15]. Furthermore, IPv6 requires the mandatory Internet Protocol Security (IPSec) protocol, whereas IPv4 does not.…”
Section: Ipv6 Protocol Overviewmentioning
confidence: 99%
“…DoS/DDoS attack is a malicious attempt to prevent legitimate users from accessing online services or resources by incapacitating the server that provides the service or bringing down the network connectivity between users and the server [5]. DoS/DDoS attacks accomplish this by flooding the target with traffic or sending specifically crafted packets that trigger a crash.…”
Section: A) Denial Of Service/ Distributed Denial Of Service Attackmentioning
confidence: 99%
“…This research computes the percentage of quantitative metrics usage by a mechanism using Equation (5).…”
Section: Qualitative Metrics In Each Mechanismmentioning
confidence: 99%
“…However, the key drawback of the model is the sole detection of the ICMPv6 Echo-Request flooding attack [52]. Moreover, the size of the datasets of 2000 ICMPv6 Echo-Request packets cannot reflect the actual behavior of the DDoS attack [53].…”
Section: Consmentioning
confidence: 99%