Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
In addition to the address expandability, IPv6 broughts new functionalities, such as Neighbor Discovery Protocol (NDP) and address auto-configuration scheme, which depends on Internet Control Message Protocol version 6 (ICMPv6) protocol. ICMPv6 is delegated with more responsibilities than Internet...
| Main Author: | Elejla, Omar E. O. |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/43724/ http://eprints.usm.my/43724/1/OMAR%20E.%20O.%20ELEJLA.pdf |
Similar Items
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Optimizing The MPLS Support For Real Time IPv6-Flows Using MPLS-PHS Approach.
by: Tat, Chee Wan, et al.
Published: (2009)
by: Tat, Chee Wan, et al.
Published: (2009)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
IPv6 packet classification based on flow label, source and destination addresses
by: Poh, Eric C. K., et al.
Published: (2005)
by: Poh, Eric C. K., et al.
Published: (2005)
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.
by: Omar, Mohd Nizam, et al.
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Representation and reasoning of fuzzy temporal knowledge
by: Nor Azlinayati Abdul Manaf,, et al.
Published: (2006)
by: Nor Azlinayati Abdul Manaf,, et al.
Published: (2006)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
A tacit health care knowledge explication info-structure using contrived knowledge acquisition and representation approaches.
by: Cheah, Yu-N
Published: (2004)
by: Cheah, Yu-N
Published: (2004)
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
An Approach For Detection Of Logical Inconsistency
by: Yadav, Rinki
Published: (2012)
by: Yadav, Rinki
Published: (2012)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
Variable order verification use of logic representation
by: Prasad, , PWC, et al.
Published: (2003)
by: Prasad, , PWC, et al.
Published: (2003)
An expansionary approach for the allocation of next generation ipv6 internet addresses.
by: Murugesan, Raja Kumar
Published: (2011)
by: Murugesan, Raja Kumar
Published: (2011)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
Industrial Machine Allocation Using Rulebased Knowledge Representation Technique.
by: Wan Rameli, Wan Nur Akmal
Published: (2010)
by: Wan Rameli, Wan Nur Akmal
Published: (2010)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
Application Of Exact String Matching Algorithms Towards SMILES Representation Of Chemical Structure.
by: Klaib, Ahmad Fadel, et al.
Published: (2007)
by: Klaib, Ahmad Fadel, et al.
Published: (2007)
Bipartite Graph Algorithm With Reference Frame Representation For Protein Tertiary Structure Matching
by: Othman, Fazilah
Published: (2010)
by: Othman, Fazilah
Published: (2010)
Towards Understanding The Protein Structure And Its Problems: Selecting Data Sources And Data Representation.
by: Sallim, Jamaludin, et al.
Published: (2007)
by: Sallim, Jamaludin, et al.
Published: (2007)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Future Internet With IPv6.
by: Budiarto, Rahmat
Published: (2009)
by: Budiarto, Rahmat
Published: (2009)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
Detection Of Distributed Denial-Of-Service (Ddos) Attack With Hyperparameter Tuning Based On Machine Learning Approach
by: Choo, Yong Han
Published: (2023)
by: Choo, Yong Han
Published: (2023)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Attacks on a robust watermarking scheme based on self-reference image
by: TING, G, et al.
Published: (2008)
by: TING, G, et al.
Published: (2008)
Crisp-fuzzy representation of Allen's temporal logic
by: Nor Azlinayati Abdul Manaf,, et al.
Published: (2007)
by: Nor Azlinayati Abdul Manaf,, et al.
Published: (2007)
Path integral representation of fractional harmonic oscillator
by: EAB, C, et al.
Published: (2006)
by: EAB, C, et al.
Published: (2006)
Robust routing table design for IPv6 lookup
by: Yong, S. M., et al.
Published: (2005)
by: Yong, S. M., et al.
Published: (2005)
Similar Items
-
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016) -
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011) -
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012) -
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015) -
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)