Selvakumar Manickam, Adnan Hasan Bdair AIghuraibawi, Rosni Abdullah, Zaid Abdi Alkareem Alyasseri, Karrar Hameed Abdulkareem, Mazin Abed Mohammed, Ayman Al-Ani,
... attack using Internet Control Message Protocol version 6 (ICMPv6) messages. Many ICMPv6-DDoS attack detection mechanisms rely on self-created datasets because very few suitable ICMPv6-DDoS attack datasets are publicly available due to ... of this work is to create a comprehensive ICMPv6-DDoS attack dataset that can be used for ... and evaluating any detection systems designed to detect ICMPv6-DDoS attacks. The proposed datasets met the criteria ... used to simulate an IPv6 network and generate ICMPv6 traffic for the dataset. The generated traffic contains ...
Tópico(s): Network Packet Processing and Optimization
2022 - Wiley | Wireless Communications and Mobile Computing
Mohammad Tayyab, Bahari Belaton, Mohammed Anbar,
... use of Internet Control Message Protocol version six (ICMPv6) messages in newly introduced features such as the ... NDP). This has exacerbated existing network attacks including ICMPv6-based Denial of Service (DoS) attacks and its ... IDS) aimed at tackling security issues raised by ICMPv6-based DoS and DDoS attacks have been reviewed ... classifies IDSs based on ML techniques to detect ICMPv6-based DoS and DDoS attacks as single and ... solution to one of the open challenges for ICMPv6-based DoS and DDoS attacks detection problem. Moreover, ...
Tópico(s): Advanced Malware Detection Techniques
2020 - Institute of Electrical and Electronics Engineers | IEEE Access
Adnan Hasan Bdair Alghuraibawi, Rosni Abdullah, Selvakumar Manickam, Zaid Abdi Alkareem Alyasseri,
... i.e., Internet Control Message Protocol version 6 (ICMPv6). The ICMPv6 protocol is considered to be very important and ... analysis are conducted anomaly detection DDoS attacks against ICMPv6 messages, in addition, explained anomaly detection types to ICMPv6 DDoS flooding attacks in IPv6 networks. Proposed using ... have a positive impact of the detection accuracy ICMPv6 DDoS attack. The review outlines the features and ...
Tópico(s): Anomaly Detection Techniques and Applications
2021 - Institute of Advanced Engineering and Science (IAES) | International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering
Redhwan M. A. Saad, Ammar Almomani, Altyeb Altaher, Brij B. Gupta, Selvakumar Manickam,
This paper proposed ICMPv6 Flood Attack Detection using DENFIS algorithms to detect denial of service (DoS) attacks in IPv6 networks. We developed C# application to send the ICMPv6 flood attack packets the flooding packets were generated ... from 10 Pings to 15 Pings, for each ICMPv6 Packet, RTT was calculated. The dataset consists of ... testing, the proposed proved that we can detect ICMPv6 Flood Attack with low root mean square error ... Fuzzy Inference System (DENFIS), Denial of service Attack, ICMPv6
Tópico(s): Internet Traffic Analysis and Secure E-voting
2013 - Indian Society for Education and Environment | Indian Journal of Science and Technology
Omar E. Elejla, Mohammed Anbar, Shady Hamouda, Serri Faisal, Abdullah Ahmed Bahashwan, Iznan H. Hasbullah,
... as the Internet Control Message Protocol version six (ICMPv6), an essential protocol to the IPv6 networks. However, ... exposes IPv6 networks to some security threats since ICMPv6 messages are not verified or authenticated, and they ... currently facing IPv6 networks is the exploitation of ICMPv6 messages by malicious actors to execute distributed denial ... proposes a deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks by introducing ...
Tópico(s): Advanced Malware Detection Techniques
2022 - Multidisciplinary Digital Publishing Institute | Applied Sciences
Redhwan M. A. Saad, Mohammed Anbar, Selvakumar Manickam, Esraa Saleh Alomari,
... is used for neighbor and router discovery is ICMPv6. However, this protocol can be used by attackers to deny network services through ICMPv6 DDoS flooding attacks that decrease the network performance. ... solve this problem, this study proposes an intelligent ICMPv6 DDoS flooding-attack detection framework using back-propagation ... that the proposed framework is capable of detecting ICMPv6 DDoS flood attacks with a detection accuracy rate ...
Tópico(s): Network Packet Processing and Optimization
2015 - Taylor & Francis | IETE Technical Review
Omar E. Elejla, Mohammed Anbar, Bahari Belaton,
... depends on Internet Control Message Protocol version 6 (ICMPv6) protocol messages. However, IPv6 inherited a number of ... DoS and DDoS attacks against IPv6 networks using ICMPv6 messages. Additionally, it analyzes the various existing detection and prevention approaches that are proposed to tackle ICMPv6-based DoS and DDoS attacks. Moreover, it explains ...
Tópico(s): Advanced Malware Detection Techniques
2016 - Taylor & Francis | IETE Technical Review
Adnan Hasan Bdair AIghuraibawi, Selvakumar Manickam, Rosni Abdullah, Zaid Abdi Alkareem Alyasseri, Ayman Khallel, Dilovan Asaad Zebari, Hussam Mohammed Jasim, Mazin Mohammed Abed, Zainb Hussein Arif,
... Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial ... one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, ... for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA- ... identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness ... the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features ( ...
Tópico(s): Network Packet Processing and Optimization
2023 - | Computer Systems Science and Engineering
Adnan Hasan Bdair, Rosni Abdullah, Selvakumar Manickam, Ahmed K. Al-Ani,
... depend on Internet Control Message Protocol version 6 (ICMPv6). A common vulnerability is the Denial of Service ( ... investigates on the detection in IPv6 networks using ICMPv6 messages and DoS, as well as DDoS attacks. ...
Tópico(s): Advanced Malware Detection Techniques
2019 - Springer Science+Business Media | Lecture notes in electrical engineering
... protocol for the constraint devices like IoT nodes. ICMPv6 protocol plays a major role in constructing the ... DIS flooding attack and DAO attack are the ICMPv6 based attacks discussed in this paper. The network ... developed in this research to detect these three ICMPv6 based security attacks in RPL based Internet of ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2021 - Science and Information Organization | International Journal of Advanced Computer Science and Applications
Ali El Ksimi, Cherkaoui Leghris, Samira Lafraxo, Vinod Kumar Verma,
... exploiting networks and reaping the benefits of IPv6. ICMPv6 is a key protocol in IPv6 implementation that ... use this protocol to deny network services using ICMPv6 DDoS flooding attacks, which reduce network performance. DDoS ... well as companies. This paper provides an intelligent ICMPv6-based DDoS flooding-attack detection system based on ... findings show that the proposed framework can identify ICMPv6 DDoS flood assaults with detection accuracy rates of ...
Tópico(s): Anomaly Detection Techniques and Applications
2023 - Taylor & Francis | IETE Journal of Research
Manali Chakraborty, Nabendu Chaki, Agostino Cortesi,
... to use Internet Control Message Protocol version 6 (ICMPv6).Such usage may lead to security breaches in ... grid as a result of possible abuses of ICMPv6 protocol.In this paper, some potential newer attacks ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2014 - Polskie Towarzystwo Informatyczne | Annals of Computer Science and Information Systems
Omar E. Elejla, Bahari Belaton, Mohammed Anbar, Basim Alabsi, Ahmed K. Al-Ani,
... the dangerous and popular IPv6 attacks which are ICMPv6-based DDoS attacks. A comparison between five classification ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2018 - Springer Science+Business Media | Lecture notes in electrical engineering
Xin Yue, Jinsong Wang, Wei Huang,
... and inverse function mapping integrated reduction (IFMIR). The ICMPv6-based DDoS attacks dataset of a new-generation ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2020 - Elsevier BV | Neurocomputing

Francisco H.M.B. Lima, Luiz F. M. Vieira, Marcos A. M. Vieira, Alex Borges Vieira, José Augusto M. Nacif,
... Water Ping, a suppression proposal for ICMP and ICMPv6 protocol messages which will serve as a building ...
Tópico(s): Indoor and Outdoor Localization Technologies
2019 - Elsevier BV | Computer Networks
Omar E. Elejla, Mohammed Anbar, Bahari Belaton, Shady Hamouda,
Tópico(s): Network Packet Processing and Optimization
2018 - Springer Science+Business Media | Neural Computing and Applications
Omar E. Elejla, Mohammed Anbar, Bahari Belaton, Basem O. Alijla,
Tópico(s): Network Packet Processing and Optimization
2018 - Springer Science+Business Media | Arabian Journal for Science and Engineering
Redhwan M. A. Saad, Mohammed Anbar, Selvakumar Manickam,
Tópico(s): Internet Traffic Analysis and Secure E-voting
2017 - Springer Science+Business Media | Neural Computing and Applications
Omar E. Elejla, Bahari Belaton, Mohammed Anbar, Ahmad Y Alnajjar,
Tópico(s): Internet Traffic Analysis and Secure E-voting
2016 - Springer Science+Business Media | Neural Computing and Applications
Mohammed Anbar, Rosni Abdullah, Redhwan M. A. Saad, Esraa Saleh Alomari, Samer Alsaleem,
... appears in the network in the form of ICMPv6. If ICMP is disabled or dropped from the ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2016 - Springer Science+Business Media | Lecture notes in electrical engineering
Sophon Mongkolluksamee, Vasaka Visoottiviseth,
... on the Linux kernel, and also extend new ICMPv6 options on Neighbor Discovery message.
Tópico(s): Wireless Networks and Protocols
2008 - Institute of Electrical and Electronics Engineers | International Conference on Advanced Communication Technology
... The metadata is carried in the payload of ICMPv6 packets. Simple text-based representations of other service ...
Tópico(s): Context-Aware Activity Recognition Systems
2015 - Springer Science+Business Media | Wireless Personal Communications
Shafiq Ul Rehman, Selvakumar Manickam,
... this protocol in the IPv6 paradigm, i.e.ICMPv6 plays a bigger role compared to ICMPv4.One ...
Tópico(s): Security in Wireless Sensor Networks
2015 - Science and Engineering Research Support Society | International Journal of Security and Its Applications
Abidah Hj Mat Taib, Wan Nor Ashiqin Wan Ali, Nurul Sharidah Shaari,
Handling Internet Control Message Protocol version 6 (ICMPv6) vulnerabilities is among the challenges in securing the IPv6 deployment. Since ICMPv6 messages are crucial in IPv6 communications, this paper discusses the discovery of ICMPv6 vulnerabilities by producing a threat model of ICMPv6 vulnerabilities and proposing the use of Selective Filtering ICMPv6 Messages (SF-ICMP6) to handle some of the ... model by observing and discussing the usage of ICMPv6 threat model together with SF-ICMP6. The findings ...
Tópico(s): Mobile Agent-Based Network Management
2013 - IGI Global | International Journal of Mobile Computing and Multimedia Communications
Adnan Hasan Bdair AIghuraibawi, Selvakumar Manickam, Rosni Abdullah, Zaid Abdi Alkareem Alyasseri, Hussam Mohammed Jasim, Nor Samsiah Sani,
... Auto-configuration scheme and Internet Control Message Protocol (ICMPv6), IPv6 is vulnerable to numerous attacks such as ... of the most dangerous attacks carried out through ICMPv6 messages that impose security and pecuniary implications. Therefore, ... features. This paper proposes a method for detecting ICMPv6 DDoS attacks using a modified Flower Pollination Algorithm ( ... to select the most relevant features from the ICMPv6 dataset to the detect ICMPv6 DDoS attacks. Second, an enhanced detecting DDoS flooding ...
Tópico(s): Network Packet Processing and Optimization
2023 - Elsevier BV | Procedia Computer Science
Omar E. Elejla, Mohammed Anbar, Shady Hamouda, Bahari Belaton, Taief Alaa Al-Amiedy, Iznan H. Hasbullah,
... core protocol, Internet Control Message Protocol version 6 (ICMPv6), need to be secured from attacks, such as ... IDSs) have been built and proposed to detect ICMPv6-based DoS and DDoS attacks. However, these IDSs ... heuristics features that do not contribute to detecting ICMPv6-based DoS and DDoS attacks. This paper proposes ...
Tópico(s): Advanced Malware Detection Techniques
2022 - Multidisciplinary Digital Publishing Institute | Symmetry
Abhay Deep Seth, Santosh Biswas, Amit Kumar Dhar,
... neighbor advertisement and neighbor solicitation spoofing attacks because ICMPv6 control messages lack in authentication. Existing strategies against ...
Tópico(s): Network Packet Processing and Optimization
2022 - Elsevier BV | Computer Networks
Chung‐Ming Huang, Ching‐Hsien Tsai, Po-chou Su,
... defined in Internet Control Message Protocol version 6 (ICMPv6) is adopted to handle the multihoming message exchange ...
Tópico(s): Network Packet Processing and Optimization
2005 - Elsevier BV | Computer Communications
Senthilkumar Mathi, Lingam Srikanth,
... predecessor due to the usage of IPsec and ICMPv6. The neighbour discovery protocol, specific to IPv6, offers ...
Tópico(s): Software-Defined Networks and 5G
2020 - Springer Science+Business Media | Lecture notes in electrical engineering
Sven Schindler, Bettina Schnor, Thomas Scheffler,
... shelf hardware and has low maintenance costs.The ICMPv6 traffic was dominated by Echo Request-based network ...
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2015 - | International Journal of Intelligent Computing Research