Hybridizing entropy based mechanism with adaptive threshold algorithm to detect RA flooding attack in IPv6 networks

SBI Shah, M Anbar, A Al-Ani, AK Al-Ani - Computational Science and …, 2019 - Springer
The implementation of the neighbor discovery protocol has introduced new security
vulnerabilities to Internet protocol version 6 (IPv6) networks. One of the most common …

A machine learning approach to detect router advertisement flooding attacks in next-generation IPv6 networks

M Anbar, R Abdullah, BN Al-Tamimi, A Hussain - Cognitive Computation, 2018 - Springer
Router advertisement (RA) flooding attack aims to exhaust all node resources, such as CPU
and memory, attached to routers on the same link. A biologically inspired machine learning …

Deep learning approach for detecting router advertisement flooding-based DDoS attacks

AH Hasan, M Anbar, TA Alamiedy - Journal of Ambient Intelligence and …, 2023 - Springer
The proliferation of connected devices under the Internet of things makes the adoption of
Internet protocol version 6 (IPv6) is occurring faster and become more needed. It was …

An intelligent icmpv6 ddos flooding-attack detection framework (v6iids) using back-propagation neural network

RMA Saad, M Anbar, S Manickam… - IETE Technical …, 2016 - Taylor & Francis
IPv6 was designed to solve the issue of adopting IPv4 addresses by presenting a large
number of address spaces. Currently, many networking devices consider IPv6 as a …

Deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks

OE Elejla, M Anbar, S Hamouda, S Faisal… - Applied Sciences, 2022 - mdpi.com
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol
version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control …

Icmpv6-based ddos flooding-attack detection using machine and deep learning techniques

A El Ksimi, C Leghris, S Lafraxo… - IETE Journal of …, 2023 - Taylor & Francis
IPv6 was created to resolve the problem of adopting IPv4 addresses by providing many
address spaces. Currently, security is becoming an increasingly important concern in …

Propose a flow-based approach for detecting abnormal behavior in neighbor discovery protocol (NDP)

AA Bahashwan, M Anbar, S Manickam… - … on Advances in Cyber …, 2021 - Springer
Abstract Neighbour Discovery Protocol is vulnerable to various attacks, such as DoS
flooding attack that uses excessive amount of Router Advertisement (RA) and Neighbour …

[PDF][PDF] A Reference Dataset for ICMPv6 Flooding Attacks* Omar E. Elejla," Bahari Belaton," Mohammed Anbar and “Ahmad Alnajjar" School of Computer Science …

O Elejla - J. Eng. Appl. Sci, 2016 - researchgate.net
IPv 6 network intrusion detection and particularly anomaly-based approaches suffer from
lack of reference datasets to be used for the comparison, deployment and performance …

Flow-based approach to detect abnormal behavior in neighbor discovery protocol (NDP)

AA Bahashwan, M Anbar, IH Hasbullah… - IEEE …, 2021 - ieeexplore.ieee.org
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …

Neighbor discovery protocol anomaly-based detection system using neural network algorithm

RMA Saad, M Anbar, S Manickam, SI Shaheen… - International Journal of …, 2024 - Springer
The exponential increase in Internet-facing devices in the last decade has resulted in IP
address exhaustion due to the limitations of the existing IPv4 address space. Therefore, the …