Journal of Engineering and Applied Sciences

Year: 2016
Volume: 11
Issue: 3
Page No. 476 - 481

A Reference Dataset for ICMPv6 Flooding Attacks

Authors : Omar E. Elejla, Bahari Belaton, Mohammed Anbar and Ahmad Alnajjar

References

Barrera, D. and P.C. van Oorschot, 2009. Security visualization tools and IPv6 addresses. Proceedings of the 6th International Workshop on Visualization for Cyber Security, October 11, 2009, Atlantic City, NJ., USA., pp: 21-26.

Combs, G., 2008. Wireshark 0.99.5 release notes. https://www.wireshark.org/docs/relnotes/wireshark-0.99.5.html.

Conta, A., S. Deering and M. Gupta, 2006. Internet Control Message Protocol (ICMPV6) for the Internet Protocol Version 6 (IPV6) specification. http://tools.ietf.org/pdf/rfc4443.pdf.

Durdagi, E. and A. Buldu, 2010. IPV4/IPV6 security and threat comparisons. Procedia-Social Behav. Sci., 2: 5285-5291.
CrossRef  |  Direct Link  |  

Elejla, O.E., A.B. Jantan and A.A. Ahmed, 2014. Three layers approach for network scanning detection. J. Theoret. Applied Inform. Technol., 70: 251-264.
Direct Link  |  

Grossman, J., B. Marsili, C. Goudjil and A. Eromenko, 2013. GNS3 graphical network simulator. https://apps.ubuntu.com/cat/applications/precise/gns3/.

Heuse, M., 2013. THC IPv6 attack tool-kit. https://www.aldeid.com/wiki/THC-IPv6-Attack-Toolkit.

LBNL. and ICSI., 2004. LBNL/ICSI enterprise tracing project. http://www.icir.org/enterprise-tracing/.

McHugh, J., 2000. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans. Inf. Syst. Secur., 3: 262-294.
CrossRef  |  Direct Link  |  

Najjar, F. and M.M. Kadhum, 2015. Reliable behavioral dataset for IPv6 neighbor discovery protocol investigation. Proceedings of the 5th International Conference on IT Convergence and Security, August 24-27, 2015, Kuala Lumpur, Malaysia, pp: 1-5.

Net Applications, 2015. Market share reports. November, 2015. http://www.netmarketshare.com/.

Neumann, J.C., 2014. The Book of GNS3: Build Virtual Network Labs Using Cisco, Juniper and More. No Starch Press, San Francisco, CA., USA., ISBN-13: 9781593275549, Pages: 272.

Saad, R.M.A., A. Almomani, A. Altaher, B.B. Gupta and. Manickam, 2014. ICMPv6 flood attack detection using DENFIS algorithms. Indian J. Sci. Technol., 7: 168-173.
Direct Link  |  

Saad, R.M.A., S. Manickam, E. Alomari, M. Anbar and P. Singh, 2014. Design and deployment of testbed based on ICMPv6 flooding attack. J. Theoret. Applied Inform. Technol., 64: 795-801.
Direct Link  |  

University of California, 2011. KDD cup 1999 data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.

WIDE., 2015. MAWI working group traffic archive. http://mawi.wide.ad.jp/mawi/.

Weber, J., 2013. IPv6 security test laboratory. Master Thesis, Ruhr-University Bochum, Germany.

Zagar, D. and K. Grgic, 2006. IPv6 security threats and possible solutions. Proceedings of the World Automation Congress, July 24-26, 2006, Budapest, Hungary, pp: 1-7.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved