Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection

In addition to the address expandability, IPv6 broughts new functionalities, such as Neighbor Discovery Protocol (NDP) and address auto-configuration scheme, which depends on Internet Control Message Protocol version 6 (ICMPv6) protocol. ICMPv6 is delegated with more responsibilities than Internet...

Full description

Bibliographic Details
Main Author: Elejla, Omar E. O.
Format: Thesis
Language:English
Published: 2018
Subjects:
Online Access:http://eprints.usm.my/43724/
http://eprints.usm.my/43724/1/OMAR%20E.%20O.%20ELEJLA.pdf
_version_ 1848879882389422080
author Elejla, Omar E. O.
author_facet Elejla, Omar E. O.
author_sort Elejla, Omar E. O.
building USM Institutional Repository
collection Online Access
description In addition to the address expandability, IPv6 broughts new functionalities, such as Neighbor Discovery Protocol (NDP) and address auto-configuration scheme, which depends on Internet Control Message Protocol version 6 (ICMPv6) protocol. ICMPv6 is delegated with more responsibilities than Internet Control Message Protocol version 4 (ICMPv4) in IPv4, and it is considered the backbone and the mandatory part in IPv6 native networks. IPv6 is vulnerable to a number of attacks from IPv4, besides new attacks have appeared within its new features. The most popular IPv6 attacks are Denial of Service (DoS) and its distributed version (DDoS) that use ICMPv6 messages. ICMPv6-based DoS & DDoS attacks are one of the major problems of today’s Internet, impacting economic damages in some serious cases.
first_indexed 2025-11-15T17:54:17Z
format Thesis
id usm-43724
institution Universiti Sains Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T17:54:17Z
publishDate 2018
recordtype eprints
repository_type Digital Repository
spelling usm-437242019-04-12T05:24:51Z http://eprints.usm.my/43724/ Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection Elejla, Omar E. O. QA75.5-76.95 Electronic computers. Computer science In addition to the address expandability, IPv6 broughts new functionalities, such as Neighbor Discovery Protocol (NDP) and address auto-configuration scheme, which depends on Internet Control Message Protocol version 6 (ICMPv6) protocol. ICMPv6 is delegated with more responsibilities than Internet Control Message Protocol version 4 (ICMPv4) in IPv4, and it is considered the backbone and the mandatory part in IPv6 native networks. IPv6 is vulnerable to a number of attacks from IPv4, besides new attacks have appeared within its new features. The most popular IPv6 attacks are Denial of Service (DoS) and its distributed version (DDoS) that use ICMPv6 messages. ICMPv6-based DoS & DDoS attacks are one of the major problems of today’s Internet, impacting economic damages in some serious cases. 2018-04 Thesis NonPeerReviewed application/pdf en http://eprints.usm.my/43724/1/OMAR%20E.%20O.%20ELEJLA.pdf Elejla, Omar E. O. (2018) Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection. PhD thesis, Universiti Sains Malaysia.
spellingShingle QA75.5-76.95 Electronic computers. Computer science
Elejla, Omar E. O.
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
title Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
title_full Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
title_fullStr Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
title_full_unstemmed Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
title_short Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
title_sort flow-representation approach for icmpv6-based ddos attacks detection
topic QA75.5-76.95 Electronic computers. Computer science
url http://eprints.usm.my/43724/
http://eprints.usm.my/43724/1/OMAR%20E.%20O.%20ELEJLA.pdf