Limpar
53 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Acesso aberto Revisado por pares

Selvakumar Manickam, Adnan Hasan Bdair AIghuraibawi, Rosni Abdullah, Zaid Abdi Alkareem Alyasseri, Karrar Hameed Abdulkareem, Mazin Abed Mohammed, Ayman Al-Ani,

... attack using Internet Control Message Protocol version 6 (ICMPv6) messages. Many ICMPv6-DDoS attack detection mechanisms rely on self-created datasets because very few suitable ICMPv6-DDoS attack datasets are publicly available due to ... of this work is to create a comprehensive ICMPv6-DDoS attack dataset that can be used for ... and evaluating any detection systems designed to detect ICMPv6-DDoS attacks. The proposed datasets met the criteria ... used to simulate an IPv6 network and generate ICMPv6 traffic for the dataset. The generated traffic contains ...

Tópico(s): Network Packet Processing and Optimization

2022 - Wiley | Wireless Communications and Mobile Computing

Revisão Acesso aberto Revisado por pares

Mohammad Tayyab, Bahari Belaton, Mohammed Anbar,

... use of Internet Control Message Protocol version six (ICMPv6) messages in newly introduced features such as the ... NDP). This has exacerbated existing network attacks including ICMPv6-based Denial of Service (DoS) attacks and its ... IDS) aimed at tackling security issues raised by ICMPv6-based DoS and DDoS attacks have been reviewed ... classifies IDSs based on ML techniques to detect ICMPv6-based DoS and DDoS attacks as single and ... solution to one of the open challenges for ICMPv6-based DoS and DDoS attacks detection problem. Moreover, ...

Tópico(s): Advanced Malware Detection Techniques

2020 - Institute of Electrical and Electronics Engineers | IEEE Access

Revisão Acesso aberto

Adnan Hasan Bdair Alghuraibawi, Rosni Abdullah, Selvakumar Manickam, Zaid Abdi Alkareem Alyasseri,

... i.e., Internet Control Message Protocol version 6 (ICMPv6). The ICMPv6 protocol is considered to be very important and ... analysis are conducted anomaly detection DDoS attacks against ICMPv6 messages, in addition, explained anomaly detection types to ICMPv6 DDoS flooding attacks in IPv6 networks. Proposed using ... have a positive impact of the detection accuracy ICMPv6 DDoS attack. The review outlines the features and ...

Tópico(s): Anomaly Detection Techniques and Applications

2021 - Institute of Advanced Engineering and Science (IAES) | International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering

Artigo Acesso aberto

Redhwan M. A. Saad, Ammar Almomani, Altyeb Altaher, Brij B. Gupta, Selvakumar Manickam,

This paper proposed ICMPv6 Flood Attack Detection using DENFIS algorithms to detect denial of service (DoS) attacks in IPv6 networks. We developed C# application to send the ICMPv6 flood attack packets the flooding packets were generated ... from 10 Pings to 15 Pings, for each ICMPv6 Packet, RTT was calculated. The dataset consists of ... testing, the proposed proved that we can detect ICMPv6 Flood Attack with low root mean square error ... Fuzzy Inference System (DENFIS), Denial of service Attack, ICMPv6

Tópico(s): Internet Traffic Analysis and Secure E-voting

2013 - Indian Society for Education and Environment | Indian Journal of Science and Technology

Artigo Acesso aberto Revisado por pares

Omar E. Elejla, Mohammed Anbar, Shady Hamouda, Serri Faisal, Abdullah Ahmed Bahashwan, Iznan H. Hasbullah,

... as the Internet Control Message Protocol version six (ICMPv6), an essential protocol to the IPv6 networks. However, ... exposes IPv6 networks to some security threats since ICMPv6 messages are not verified or authenticated, and they ... currently facing IPv6 networks is the exploitation of ICMPv6 messages by malicious actors to execute distributed denial ... proposes a deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks by introducing ...

Tópico(s): Advanced Malware Detection Techniques

2022 - Multidisciplinary Digital Publishing Institute | Applied Sciences

Artigo Revisado por pares

Redhwan M. A. Saad, Mohammed Anbar, Selvakumar Manickam, Esraa Saleh Alomari,

... is used for neighbor and router discovery is ICMPv6. However, this protocol can be used by attackers to deny network services through ICMPv6 DDoS flooding attacks that decrease the network performance. ... solve this problem, this study proposes an intelligent ICMPv6 DDoS flooding-attack detection framework using back-propagation ... that the proposed framework is capable of detecting ICMPv6 DDoS flood attacks with a detection accuracy rate ...

Tópico(s): Network Packet Processing and Optimization

2015 - Taylor & Francis | IETE Technical Review

Artigo Revisado por pares

Omar E. Elejla, Mohammed Anbar, Bahari Belaton,

... depends on Internet Control Message Protocol version 6 (ICMPv6) protocol messages. However, IPv6 inherited a number of ... DoS and DDoS attacks against IPv6 networks using ICMPv6 messages. Additionally, it analyzes the various existing detection and prevention approaches that are proposed to tackle ICMPv6-based DoS and DDoS attacks. Moreover, it explains ...

Tópico(s): Advanced Malware Detection Techniques

2016 - Taylor & Francis | IETE Technical Review

Artigo Acesso aberto Revisado por pares

Adnan Hasan Bdair AIghuraibawi, Selvakumar Manickam, Rosni Abdullah, Zaid Abdi Alkareem Alyasseri, Ayman Khallel, Dilovan Asaad Zebari, Hussam Mohammed Jasim, Mazin Mohammed Abed, Zainb Hussein Arif,

... Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial ... one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, ... for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA- ... identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness ... the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features ( ...

Tópico(s): Network Packet Processing and Optimization

2023 - | Computer Systems Science and Engineering

Capítulo de livro Revisado por pares

Adnan Hasan Bdair, Rosni Abdullah, Selvakumar Manickam, Ahmed K. Al-Ani,

... depend on Internet Control Message Protocol version 6 (ICMPv6). A common vulnerability is the Denial of Service ( ... investigates on the detection in IPv6 networks using ICMPv6 messages and DoS, as well as DDoS attacks. ...

Tópico(s): Advanced Malware Detection Techniques

2019 - Springer Science+Business Media | Lecture notes in electrical engineering

Artigo Acesso aberto

A. Arul Anitha, L. Arockiam,

... protocol for the constraint devices like IoT nodes. ICMPv6 protocol plays a major role in constructing the ... DIS flooding attack and DAO attack are the ICMPv6 based attacks discussed in this paper. The network ... developed in this research to detect these three ICMPv6 based security attacks in RPL based Internet of ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2021 - Science and Information Organization | International Journal of Advanced Computer Science and Applications

Artigo

Ali El Ksimi, Cherkaoui Leghris, Samira Lafraxo, Vinod Kumar Verma,

... exploiting networks and reaping the benefits of IPv6. ICMPv6 is a key protocol in IPv6 implementation that ... use this protocol to deny network services using ICMPv6 DDoS flooding attacks, which reduce network performance. DDoS ... well as companies. This paper provides an intelligent ICMPv6-based DDoS flooding-attack detection system based on ... findings show that the proposed framework can identify ICMPv6 DDoS flood assaults with detection accuracy rates of ...

Tópico(s): Anomaly Detection Techniques and Applications

2023 - Taylor & Francis | IETE Journal of Research

Artigo Acesso aberto Revisado por pares

Manali Chakraborty, Nabendu Chaki, Agostino Cortesi,

... to use Internet Control Message Protocol version 6 (ICMPv6).Such usage may lead to security breaches in ... grid as a result of possible abuses of ICMPv6 protocol.In this paper, some potential newer attacks ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2014 - Polskie Towarzystwo Informatyczne | Annals of Computer Science and Information Systems

Capítulo de livro Revisado por pares

Omar E. Elejla, Bahari Belaton, Mohammed Anbar, Basim Alabsi, Ahmed K. Al-Ani,

... the dangerous and popular IPv6 attacks which are ICMPv6-based DDoS attacks. A comparison between five classification ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2018 - Springer Science+Business Media | Lecture notes in electrical engineering

Artigo Revisado por pares

Xin Yue, Jinsong Wang, Wei Huang,

... and inverse function mapping integrated reduction (IFMIR). The ICMPv6-based DDoS attacks dataset of a new-generation ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2020 - Elsevier BV | Neurocomputing

Artigo Brasil Produção Nacional Revisado por pares

Francisco H.M.B. Lima, Luiz F. M. Vieira, Marcos A. M. Vieira, Alex Borges Vieira, José Augusto M. Nacif,

... Water Ping, a suppression proposal for ICMP and ICMPv6 protocol messages which will serve as a building ...

Tópico(s): Indoor and Outdoor Localization Technologies

2019 - Elsevier BV | Computer Networks

Artigo Revisado por pares

Omar E. Elejla, Mohammed Anbar, Bahari Belaton, Shady Hamouda,

Tópico(s): Network Packet Processing and Optimization

2018 - Springer Science+Business Media | Neural Computing and Applications

Artigo Revisado por pares

Omar E. Elejla, Mohammed Anbar, Bahari Belaton, Basem O. Alijla,

Tópico(s): Network Packet Processing and Optimization

2018 - Springer Science+Business Media | Arabian Journal for Science and Engineering

Artigo Revisado por pares

Redhwan M. A. Saad, Mohammed Anbar, Selvakumar Manickam,

Tópico(s): Internet Traffic Analysis and Secure E-voting

2017 - Springer Science+Business Media | Neural Computing and Applications

Artigo Revisado por pares

Omar E. Elejla, Bahari Belaton, Mohammed Anbar, Ahmad Y Alnajjar,

Tópico(s): Internet Traffic Analysis and Secure E-voting

2016 - Springer Science+Business Media | Neural Computing and Applications

Capítulo de livro Revisado por pares

Mohammed Anbar, Rosni Abdullah, Redhwan M. A. Saad, Esraa Saleh Alomari, Samer Alsaleem,

... appears in the network in the form of ICMPv6. If ICMP is disabled or dropped from the ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2016 - Springer Science+Business Media | Lecture notes in electrical engineering

Artigo

Sophon Mongkolluksamee, Vasaka Visoottiviseth,

... on the Linux kernel, and also extend new ICMPv6 options on Neighbor Discovery message.

Tópico(s): Wireless Networks and Protocols

2008 - Institute of Electrical and Electronics Engineers | International Conference on Advanced Communication Technology

Artigo Acesso aberto Revisado por pares

Yunus Durmus, Ertan Onur,

... The metadata is carried in the payload of ICMPv6 packets. Simple text-based representations of other service ...

Tópico(s): Context-Aware Activity Recognition Systems

2015 - Springer Science+Business Media | Wireless Personal Communications

Artigo Acesso aberto

Shafiq Ul Rehman, Selvakumar Manickam,

... this protocol in the IPv6 paradigm, i.e.ICMPv6 plays a bigger role compared to ICMPv4.One ...

Tópico(s): Security in Wireless Sensor Networks

2015 - Science and Engineering Research Support Society | International Journal of Security and Its Applications

Artigo Revisado por pares

Abidah Hj Mat Taib, Wan Nor Ashiqin Wan Ali, Nurul Sharidah Shaari,

Handling Internet Control Message Protocol version 6 (ICMPv6) vulnerabilities is among the challenges in securing the IPv6 deployment. Since ICMPv6 messages are crucial in IPv6 communications, this paper discusses the discovery of ICMPv6 vulnerabilities by producing a threat model of ICMPv6 vulnerabilities and proposing the use of Selective Filtering ICMPv6 Messages (SF-ICMP6) to handle some of the ... model by observing and discussing the usage of ICMPv6 threat model together with SF-ICMP6. The findings ...

Tópico(s): Mobile Agent-Based Network Management

2013 - IGI Global | International Journal of Mobile Computing and Multimedia Communications

Artigo Acesso aberto Revisado por pares

Adnan Hasan Bdair AIghuraibawi, Selvakumar Manickam, Rosni Abdullah, Zaid Abdi Alkareem Alyasseri, Hussam Mohammed Jasim, Nor Samsiah Sani,

... Auto-configuration scheme and Internet Control Message Protocol (ICMPv6), IPv6 is vulnerable to numerous attacks such as ... of the most dangerous attacks carried out through ICMPv6 messages that impose security and pecuniary implications. Therefore, ... features. This paper proposes a method for detecting ICMPv6 DDoS attacks using a modified Flower Pollination Algorithm ( ... to select the most relevant features from the ICMPv6 dataset to the detect ICMPv6 DDoS attacks. Second, an enhanced detecting DDoS flooding ...

Tópico(s): Network Packet Processing and Optimization

2023 - Elsevier BV | Procedia Computer Science

Artigo Acesso aberto Revisado por pares

Omar E. Elejla, Mohammed Anbar, Shady Hamouda, Bahari Belaton, Taief Alaa Al-Amiedy, Iznan H. Hasbullah,

... core protocol, Internet Control Message Protocol version 6 (ICMPv6), need to be secured from attacks, such as ... IDSs) have been built and proposed to detect ICMPv6-based DoS and DDoS attacks. However, these IDSs ... heuristics features that do not contribute to detecting ICMPv6-based DoS and DDoS attacks. This paper proposes ...

Tópico(s): Advanced Malware Detection Techniques

2022 - Multidisciplinary Digital Publishing Institute | Symmetry

Artigo Revisado por pares

Abhay Deep Seth, Santosh Biswas, Amit Kumar Dhar,

... neighbor advertisement and neighbor solicitation spoofing attacks because ICMPv6 control messages lack in authentication. Existing strategies against ...

Tópico(s): Network Packet Processing and Optimization

2022 - Elsevier BV | Computer Networks

Artigo Revisado por pares

Chung‐Ming Huang, Ching‐Hsien Tsai, Po-chou Su,

... defined in Internet Control Message Protocol version 6 (ICMPv6) is adopted to handle the multihoming message exchange ...

Tópico(s): Network Packet Processing and Optimization

2005 - Elsevier BV | Computer Communications

Capítulo de livro Revisado por pares

Senthilkumar Mathi, Lingam Srikanth,

... predecessor due to the usage of IPsec and ICMPv6. The neighbour discovery protocol, specific to IPv6, offers ...

Tópico(s): Software-Defined Networks and 5G

2020 - Springer Science+Business Media | Lecture notes in electrical engineering

Artigo Acesso aberto

Sven Schindler, Bettina Schnor, Thomas Scheffler,

... shelf hardware and has low maintenance costs.The ICMPv6 traffic was dominated by Echo Request-based network ...

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2015 - | International Journal of Intelligent Computing Research