ICMPv6-based DDoS Flooding-Attack Detection Using Machine and Deep Learning Techniques

被引:2
|
作者
El Ksimi, Ali [1 ]
Leghris, Cherkaoui [3 ]
Lafraxo, Samira [2 ]
Verma, Vinod Kumar [4 ]
机构
[1] Hassan II Univ Mohammedia, Fac Sci & Tech Mohammadia, Comp Sci, Mohammadia, Morocco
[2] Hassan II Univ Mohammedia, Fac Sci & Tech Mohammadia, Mohammadia, Morocco
[3] Ibn Zohr Univ, Agadir, Morocco
[4] St Longowal Inst Engn & Technol, Dept Comp Sci & Engn, Longowal, India
关键词
ANN; DDoS; Dos; Flow-based anomaly detection; ICMPv6; Intrusion detection; IPv6; Machine learning; System;
D O I
10.1080/03772063.2023.2208549
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
IPv6 was created to resolve the problem of adopting IPv4 addresses by providing many address spaces. Currently, security is becoming an increasingly important concern in exploiting networks and reaping the benefits of IPv6. ICMPv6 is a key protocol in IPv6 implementation that is utilized for neighbor and router discovery. However, attackers can use this protocol to deny network services using ICMPv6 DDoS flooding attacks, which reduce network performance. DDoS is a difficult challenge on the internet since it is one of the most common attacks impacting a network, causing enormous economic harm to people as well as companies. This paper provides an intelligent ICMPv6-based DDoS flooding-attack detection system based on an artificial neural network to address this issue. This study additionally investigates and examines the suggested framework's detection accuracy. Using real datasets, we illustrate the efficiency of our methodology. To validate our system, we chose different machine learning algorithms and compared their outcomes. The findings show that the proposed framework can identify ICMPv6 DDoS flood assaults with detection accuracy rates of 99.98% for the first dataset and 85.91% for the second dataset.
引用
收藏
页码:3753 / 3762
页数:10
相关论文
共 50 条
  • [1] ICMPv6-Based DoS and DDoS Attacks Detection Using Machine Learning Techniques, Open Challenges, and Blockchain Applicability: A Review
    Tayyab, Mohammad
    Belaton, Bahari
    Anbar, Mohammed
    [J]. IEEE ACCESS, 2020, 8 : 170529 - 170547
  • [2] Intrusion Detection Systems of ICMPv6-based DDoS attacks
    Elejla, Omar E.
    Belaton, Bahari
    Anbar, Mohammed
    Alnajjar, Ahmad
    [J]. NEURAL COMPUTING & APPLICATIONS, 2018, 30 (01): : 45 - 56
  • [3] Intrusion Detection Systems of ICMPv6-based DDoS attacks
    Omar E. Elejla
    Bahari Belaton
    Mohammed Anbar
    Ahmad Alnajjar
    [J]. Neural Computing and Applications, 2018, 30 : 45 - 56
  • [4] Comparison of Classification Algorithms on ICMPv6-Based DDoS Attacks Detection
    Elejla, Omar E.
    Belaton, Bahari
    Anbar, Mohammed
    Alabsi, Basim
    Al-Ani, Ahmed K.
    [J]. COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 347 - 357
  • [5] Flow-Based IDS for ICMPv6-Based DDoS Attacks Detection
    Elejla, Omar E.
    Anbar, Mohammed
    Belaton, Bahari
    Alijla, Basem O.
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 7757 - 7775
  • [6] Flow-Based IDS for ICMPv6-Based DDoS Attacks Detection
    Omar E. Elejla
    Mohammed Anbar
    Bahari Belaton
    Basem O. Alijla
    [J]. Arabian Journal for Science and Engineering, 2018, 43 : 7757 - 7775
  • [7] An Intelligent ICMPv6 DDoS Flooding-Attack Detection Framework (v6IIDS) using Back-Propagation Neural Network
    Saad, Redhwan M. A.
    Anbar, Mohammed
    Manickam, Selvakumar
    Alomari, Esraa
    [J]. IETE TECHNICAL REVIEW, 2016, 33 (03) : 244 - 255
  • [8] ICMPv6-Based DoS and DDoS Attacks and Defense Mechanisms: Review
    Elejla, Omar E.
    Anbar, Mohammed
    Belaton, Bahari
    [J]. IETE TECHNICAL REVIEW, 2017, 34 (04) : 390 - 407
  • [9] Labeled flow-based dataset of ICMPv6-based DDoS attacks
    Elejla, Omar E.
    Anbar, Mohammed
    Belaton, Bahari
    Hamouda, Shady
    [J]. NEURAL COMPUTING & APPLICATIONS, 2019, 31 (08): : 3629 - 3646
  • [10] Labeled flow-based dataset of ICMPv6-based DDoS attacks
    Omar E. Elejla
    Mohammed Anbar
    Bahari Belaton
    Shady Hamouda
    [J]. Neural Computing and Applications, 2019, 31 : 3629 - 3646