Labelled Dataset on Distributed Denial‐of‐Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6) Article Swipe
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.1155/2022/8060333
The most dangerous attack against IPv6 networks today is a distributed denial‐of‐service (DDoS) attack using Internet Control Message Protocol version 6 (ICMPv6) messages. Many ICMPv6‐DDoS attack detection mechanisms rely on self‐created datasets because very few suitable ICMPv6‐DDoS attack datasets are publicly available due to privacy and security concerns. When implemented in a real network, however, a detection system that relies on a dataset with incorrect packet or flow representation and contains unqualified features generates a large number of false alerts. The goal of this work is to create a comprehensive ICMPv6‐DDoS attack dataset that can be used for tuning, benchmarking, and evaluating any detection systems designed to detect ICMPv6‐DDoS attacks. The proposed datasets met the criteria for a good dataset, ensuring their usefulness to other researchers. A GNS3 network simulation tool is used to simulate an IPv6 network and generate ICMPv6 traffic for the dataset. The generated traffic contains both normal and abnormal ICMPv6 traffic, with the abnormal traffic containing ten different ICMPv6‐DDoS attacks based on RA and NS message flooding. Five classifiers were chosen, varying in terms of type, classification performance, and the number of features used, and the results were as follows: decision tree 80%, support vector machine 78%, naïve Bayes 80%, k ‐nearest neighbours 81%, and neural networks 81%. The proposed dataset has been shown to accurately represent attack traffic in tests, with a high detection accuracy and a low false‐positive rate.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1155/2022/8060333
- https://downloads.hindawi.com/journals/wcmc/2022/8060333.pdf
- OA Status
- hybrid
- Cited By
- 18
- References
- 30
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4224046934
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4224046934Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1155/2022/8060333Digital Object Identifier
- Title
-
Labelled Dataset on Distributed Denial‐of‐Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6)Work title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2022Year of publication
- Publication date
-
2022-01-01Full publication date if available
- Authors
-
Selvakumar Manickam, Adnan Hasan Bdair AIghuraibawi, Rosni Abdullah, Zaid Abdi Alkareem Alyasseri, Karrar Hameed Abdulkareem, Mazin Abed Mohammed, Ayman Al-AniList of authors in order
- Landing page
-
https://doi.org/10.1155/2022/8060333Publisher landing page
- PDF URL
-
https://downloads.hindawi.com/journals/wcmc/2022/8060333.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://downloads.hindawi.com/journals/wcmc/2022/8060333.pdfDirect OA link when available
- Concepts
-
Denial-of-service attack, Computer science, Trinoo, Application layer DDoS attack, Flooding (psychology), Computer network, The Internet, Protocol (science), Network packet, Naive Bayes classifier, Data mining, Computer security, Machine learning, Support vector machine, World Wide Web, Pathology, Psychotherapist, Medicine, Psychology, Alternative medicineTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
18Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 4, 2024: 5, 2023: 5, 2022: 4Per-year citation counts (last 5 years)
- References (count)
-
30Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4224046934 |
|---|---|
| doi | https://doi.org/10.1155/2022/8060333 |
| ids.doi | https://doi.org/10.1155/2022/8060333 |
| ids.openalex | https://openalex.org/W4224046934 |
| fwci | 3.85635141 |
| type | article |
| title | Labelled Dataset on Distributed Denial‐of‐Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6) |
| biblio.issue | 1 |
| biblio.volume | 2022 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T11598 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9991999864578247 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Internet Traffic Analysis and Secure E-voting |
| topics[2].id | https://openalex.org/T12326 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9970999956130981 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1708 |
| topics[2].subfield.display_name | Hardware and Architecture |
| topics[2].display_name | Network Packet Processing and Optimization |
| is_xpac | False |
| apc_list.value | 2300 |
| apc_list.currency | USD |
| apc_list.value_usd | 2300 |
| apc_paid.value | 2300 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 2300 |
| concepts[0].id | https://openalex.org/C38822068 |
| concepts[0].level | 3 |
| concepts[0].score | 0.8960859775543213 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[0].display_name | Denial-of-service attack |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.877634584903717 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C43639116 |
| concepts[2].level | 5 |
| concepts[2].score | 0.658993124961853 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q7843050 |
| concepts[2].display_name | Trinoo |
| concepts[3].id | https://openalex.org/C120865594 |
| concepts[3].level | 4 |
| concepts[3].score | 0.6118751168251038 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[3].display_name | Application layer DDoS attack |
| concepts[4].id | https://openalex.org/C186594467 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5544478297233582 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1429176 |
| concepts[4].display_name | Flooding (psychology) |
| concepts[5].id | https://openalex.org/C31258907 |
| concepts[5].level | 1 |
| concepts[5].score | 0.47983381152153015 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[5].display_name | Computer network |
| concepts[6].id | https://openalex.org/C110875604 |
| concepts[6].level | 2 |
| concepts[6].score | 0.4524170756340027 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[6].display_name | The Internet |
| concepts[7].id | https://openalex.org/C2780385302 |
| concepts[7].level | 3 |
| concepts[7].score | 0.44433072209358215 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q367158 |
| concepts[7].display_name | Protocol (science) |
| concepts[8].id | https://openalex.org/C158379750 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4439114034175873 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q214111 |
| concepts[8].display_name | Network packet |
| concepts[9].id | https://openalex.org/C52001869 |
| concepts[9].level | 3 |
| concepts[9].score | 0.43380671739578247 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q812530 |
| concepts[9].display_name | Naive Bayes classifier |
| concepts[10].id | https://openalex.org/C124101348 |
| concepts[10].level | 1 |
| concepts[10].score | 0.4284517467021942 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[10].display_name | Data mining |
| concepts[11].id | https://openalex.org/C38652104 |
| concepts[11].level | 1 |
| concepts[11].score | 0.4024393558502197 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[11].display_name | Computer security |
| concepts[12].id | https://openalex.org/C119857082 |
| concepts[12].level | 1 |
| concepts[12].score | 0.3019818663597107 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q2539 |
| concepts[12].display_name | Machine learning |
| concepts[13].id | https://openalex.org/C12267149 |
| concepts[13].level | 2 |
| concepts[13].score | 0.2670413851737976 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q282453 |
| concepts[13].display_name | Support vector machine |
| concepts[14].id | https://openalex.org/C136764020 |
| concepts[14].level | 1 |
| concepts[14].score | 0.09212875366210938 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[14].display_name | World Wide Web |
| concepts[15].id | https://openalex.org/C142724271 |
| concepts[15].level | 1 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q7208 |
| concepts[15].display_name | Pathology |
| concepts[16].id | https://openalex.org/C542102704 |
| concepts[16].level | 1 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q183257 |
| concepts[16].display_name | Psychotherapist |
| concepts[17].id | https://openalex.org/C71924100 |
| concepts[17].level | 0 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q11190 |
| concepts[17].display_name | Medicine |
| concepts[18].id | https://openalex.org/C15744967 |
| concepts[18].level | 0 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q9418 |
| concepts[18].display_name | Psychology |
| concepts[19].id | https://openalex.org/C204787440 |
| concepts[19].level | 2 |
| concepts[19].score | 0.0 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q188504 |
| concepts[19].display_name | Alternative medicine |
| keywords[0].id | https://openalex.org/keywords/denial-of-service-attack |
| keywords[0].score | 0.8960859775543213 |
| keywords[0].display_name | Denial-of-service attack |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.877634584903717 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/trinoo |
| keywords[2].score | 0.658993124961853 |
| keywords[2].display_name | Trinoo |
| keywords[3].id | https://openalex.org/keywords/application-layer-ddos-attack |
| keywords[3].score | 0.6118751168251038 |
| keywords[3].display_name | Application layer DDoS attack |
| keywords[4].id | https://openalex.org/keywords/flooding |
| keywords[4].score | 0.5544478297233582 |
| keywords[4].display_name | Flooding (psychology) |
| keywords[5].id | https://openalex.org/keywords/computer-network |
| keywords[5].score | 0.47983381152153015 |
| keywords[5].display_name | Computer network |
| keywords[6].id | https://openalex.org/keywords/the-internet |
| keywords[6].score | 0.4524170756340027 |
| keywords[6].display_name | The Internet |
| keywords[7].id | https://openalex.org/keywords/protocol |
| keywords[7].score | 0.44433072209358215 |
| keywords[7].display_name | Protocol (science) |
| keywords[8].id | https://openalex.org/keywords/network-packet |
| keywords[8].score | 0.4439114034175873 |
| keywords[8].display_name | Network packet |
| keywords[9].id | https://openalex.org/keywords/naive-bayes-classifier |
| keywords[9].score | 0.43380671739578247 |
| keywords[9].display_name | Naive Bayes classifier |
| keywords[10].id | https://openalex.org/keywords/data-mining |
| keywords[10].score | 0.4284517467021942 |
| keywords[10].display_name | Data mining |
| keywords[11].id | https://openalex.org/keywords/computer-security |
| keywords[11].score | 0.4024393558502197 |
| keywords[11].display_name | Computer security |
| keywords[12].id | https://openalex.org/keywords/machine-learning |
| keywords[12].score | 0.3019818663597107 |
| keywords[12].display_name | Machine learning |
| keywords[13].id | https://openalex.org/keywords/support-vector-machine |
| keywords[13].score | 0.2670413851737976 |
| keywords[13].display_name | Support vector machine |
| keywords[14].id | https://openalex.org/keywords/world-wide-web |
| keywords[14].score | 0.09212875366210938 |
| keywords[14].display_name | World Wide Web |
| language | en |
| locations[0].id | doi:10.1155/2022/8060333 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S235346 |
| locations[0].source.issn | 1530-8669, 1530-8677 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1530-8669 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Wireless Communications and Mobile Computing |
| locations[0].source.host_organization | https://openalex.org/P4310320595 |
| locations[0].source.host_organization_name | Wiley |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320595 |
| locations[0].source.host_organization_lineage_names | Wiley |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://downloads.hindawi.com/journals/wcmc/2022/8060333.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Wireless Communications and Mobile Computing |
| locations[0].landing_page_url | https://doi.org/10.1155/2022/8060333 |
| locations[1].id | pmh:oai:doaj.org/article:fb7cabbe5c0442e79a612784ac264210 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | Wireless Communications and Mobile Computing, Vol 2022 (2022) |
| locations[1].landing_page_url | https://doaj.org/article/fb7cabbe5c0442e79a612784ac264210 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5042044177 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Selvakumar Manickam |
| authorships[0].countries | MY |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I139322472 |
| authorships[0].affiliations[0].raw_affiliation_string | National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Penang 11800, Malaysia |
| authorships[0].institutions[0].id | https://openalex.org/I139322472 |
| authorships[0].institutions[0].ror | https://ror.org/02rgb2k63 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I139322472 |
| authorships[0].institutions[0].country_code | MY |
| authorships[0].institutions[0].display_name | Universiti Sains Malaysia |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Selvakumar Manickam |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Penang 11800, Malaysia |
| authorships[1].author.id | https://openalex.org/A5050294360 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-8460-9662 |
| authorships[1].author.display_name | Adnan Hasan Bdair AIghuraibawi |
| authorships[1].countries | IQ, MY |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I139322472 |
| authorships[1].affiliations[0].raw_affiliation_string | National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Penang 11800, Malaysia |
| authorships[1].affiliations[1].institution_ids | https://openalex.org/I2802535771 |
| authorships[1].affiliations[1].raw_affiliation_string | Baghdad College of Economic Sciences University, Baghdad, Iraq |
| authorships[1].institutions[0].id | https://openalex.org/I2802535771 |
| authorships[1].institutions[0].ror | https://ror.org/026dp8058 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I2802535771 |
| authorships[1].institutions[0].country_code | IQ |
| authorships[1].institutions[0].display_name | Baghdad College of Economic Sciences University |
| authorships[1].institutions[1].id | https://openalex.org/I139322472 |
| authorships[1].institutions[1].ror | https://ror.org/02rgb2k63 |
| authorships[1].institutions[1].type | education |
| authorships[1].institutions[1].lineage | https://openalex.org/I139322472 |
| authorships[1].institutions[1].country_code | MY |
| authorships[1].institutions[1].display_name | Universiti Sains Malaysia |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Adnan Hasan Bdair AIghuraibawi |
| authorships[1].is_corresponding | True |
| authorships[1].raw_affiliation_strings | Baghdad College of Economic Sciences University, Baghdad, Iraq, National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Penang 11800, Malaysia |
| authorships[2].author.id | https://openalex.org/A5051571958 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-3061-5837 |
| authorships[2].author.display_name | Rosni Abdullah |
| authorships[2].countries | MY |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I139322472 |
| authorships[2].affiliations[0].raw_affiliation_string | School of Computer Sciences, Universiti Sains Malaysia, Penang 11800, Malaysia |
| authorships[2].institutions[0].id | https://openalex.org/I139322472 |
| authorships[2].institutions[0].ror | https://ror.org/02rgb2k63 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I139322472 |
| authorships[2].institutions[0].country_code | MY |
| authorships[2].institutions[0].display_name | Universiti Sains Malaysia |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Rosni Abdullah |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | School of Computer Sciences, Universiti Sains Malaysia, Penang 11800, Malaysia |
| authorships[3].author.id | https://openalex.org/A5062826520 |
| authorships[3].author.orcid | https://orcid.org/0000-0003-4228-9298 |
| authorships[3].author.display_name | Zaid Abdi Alkareem Alyasseri |
| authorships[3].countries | IQ |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I47229656 |
| authorships[3].affiliations[0].raw_affiliation_string | ECE Dept. Faculty of Engineering, University of Kufa, Najaf, Iraq |
| authorships[3].affiliations[1].institution_ids | https://openalex.org/I47229656 |
| authorships[3].affiliations[1].raw_affiliation_string | Information Technology Research and Development Center (ITRDC), University of Kufa, Najaf, Iraq |
| authorships[3].institutions[0].id | https://openalex.org/I47229656 |
| authorships[3].institutions[0].ror | https://ror.org/02dwrdh81 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I47229656 |
| authorships[3].institutions[0].country_code | IQ |
| authorships[3].institutions[0].display_name | University of Kufa |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Zaid Abdi Alkareem Alyasseri |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | ECE Dept. Faculty of Engineering, University of Kufa, Najaf, Iraq, Information Technology Research and Development Center (ITRDC), University of Kufa, Najaf, Iraq |
| authorships[4].author.id | https://openalex.org/A5089923255 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-7302-2049 |
| authorships[4].author.display_name | Karrar Hameed Abdulkareem |
| authorships[4].countries | IQ |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I501048437 |
| authorships[4].affiliations[0].raw_affiliation_string | College of Agriculture, Al-Muthanna University, Samawah 66001, Iraq |
| authorships[4].institutions[0].id | https://openalex.org/I501048437 |
| authorships[4].institutions[0].ror | https://ror.org/03877wr45 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I501048437 |
| authorships[4].institutions[0].country_code | IQ |
| authorships[4].institutions[0].display_name | Al-Muthanna University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Karrar Hameed Abdulkareem |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | College of Agriculture, Al-Muthanna University, Samawah 66001, Iraq |
| authorships[5].author.id | https://openalex.org/A5091151166 |
| authorships[5].author.orcid | https://orcid.org/0000-0001-9030-8102 |
| authorships[5].author.display_name | Mazin Abed Mohammed |
| authorships[5].countries | IQ |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I27768575 |
| authorships[5].affiliations[0].raw_affiliation_string | College of Computer Science and Information Technology, University of Anbar, 11, Ramadi, 55431 Anbar, Iraq |
| authorships[5].institutions[0].id | https://openalex.org/I27768575 |
| authorships[5].institutions[0].ror | https://ror.org/055a6gk50 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I27768575 |
| authorships[5].institutions[0].country_code | IQ |
| authorships[5].institutions[0].display_name | University of Anbar |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Mazin Abed Mohammed |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | College of Computer Science and Information Technology, University of Anbar, 11, Ramadi, 55431 Anbar, Iraq |
| authorships[6].author.id | https://openalex.org/A5035195192 |
| authorships[6].author.orcid | https://orcid.org/0000-0001-8391-5887 |
| authorships[6].author.display_name | Ayman Al-Ani |
| authorships[6].countries | MY |
| authorships[6].affiliations[0].institution_ids | https://openalex.org/I161371597 |
| authorships[6].affiliations[0].raw_affiliation_string | Faculty Of Computing and Informatics, Universiti Malaysia Sabah, Jalan UMS, 88400 Kota Kinabalu Sabah, Malaysia |
| authorships[6].institutions[0].id | https://openalex.org/I161371597 |
| authorships[6].institutions[0].ror | https://ror.org/040v70252 |
| authorships[6].institutions[0].type | education |
| authorships[6].institutions[0].lineage | https://openalex.org/I161371597 |
| authorships[6].institutions[0].country_code | MY |
| authorships[6].institutions[0].display_name | Universiti of Malaysia Sabah |
| authorships[6].author_position | last |
| authorships[6].raw_author_name | Ayman Alani |
| authorships[6].is_corresponding | False |
| authorships[6].raw_affiliation_strings | Faculty Of Computing and Informatics, Universiti Malaysia Sabah, Jalan UMS, 88400 Kota Kinabalu Sabah, Malaysia |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://downloads.hindawi.com/journals/wcmc/2022/8060333.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Labelled Dataset on Distributed Denial‐of‐Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6) |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2783466926, https://openalex.org/W4286539397, https://openalex.org/W1968168724, https://openalex.org/W2204131204, https://openalex.org/W2754163055, https://openalex.org/W4322008378, https://openalex.org/W2383770723, https://openalex.org/W2186749541, https://openalex.org/W2360429410, https://openalex.org/W4256682929 |
| cited_by_count | 18 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 4 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 5 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 5 |
| counts_by_year[3].year | 2022 |
| counts_by_year[3].cited_by_count | 4 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1155/2022/8060333 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S235346 |
| best_oa_location.source.issn | 1530-8669, 1530-8677 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1530-8669 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Wireless Communications and Mobile Computing |
| best_oa_location.source.host_organization | https://openalex.org/P4310320595 |
| best_oa_location.source.host_organization_name | Wiley |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320595 |
| best_oa_location.source.host_organization_lineage_names | Wiley |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://downloads.hindawi.com/journals/wcmc/2022/8060333.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Wireless Communications and Mobile Computing |
| best_oa_location.landing_page_url | https://doi.org/10.1155/2022/8060333 |
| primary_location.id | doi:10.1155/2022/8060333 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S235346 |
| primary_location.source.issn | 1530-8669, 1530-8677 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1530-8669 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Wireless Communications and Mobile Computing |
| primary_location.source.host_organization | https://openalex.org/P4310320595 |
| primary_location.source.host_organization_name | Wiley |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320595 |
| primary_location.source.host_organization_lineage_names | Wiley |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://downloads.hindawi.com/journals/wcmc/2022/8060333.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Wireless Communications and Mobile Computing |
| primary_location.landing_page_url | https://doi.org/10.1155/2022/8060333 |
| publication_date | 2022-01-01 |
| publication_year | 2022 |
| referenced_works | https://openalex.org/W4292117754, https://openalex.org/W4300747978, https://openalex.org/W4235381699, https://openalex.org/W2034698017, https://openalex.org/W2970152050, https://openalex.org/W2561257879, https://openalex.org/W1827189246, https://openalex.org/W2042255475, https://openalex.org/W6640394456, https://openalex.org/W2119549542, https://openalex.org/W2098975392, https://openalex.org/W2782255728, https://openalex.org/W2794216652, https://openalex.org/W2076823594, https://openalex.org/W2157526634, https://openalex.org/W2171331105, https://openalex.org/W2163950614, https://openalex.org/W1653622375, https://openalex.org/W2108513376, https://openalex.org/W2103414007, https://openalex.org/W3158747429, https://openalex.org/W4200305402, https://openalex.org/W1999427165, https://openalex.org/W2031163547, https://openalex.org/W2533798887, https://openalex.org/W2015089449, https://openalex.org/W2088729967, https://openalex.org/W2991396638, https://openalex.org/W2885654498, https://openalex.org/W1940258742 |
| referenced_works_count | 30 |
| abstract_inverted_index.6 | 20 |
| abstract_inverted_index.A | 126 |
| abstract_inverted_index.a | 9, 51, 55, 61, 74, 88, 117, 226, 231 |
| abstract_inverted_index.k | 204 |
| abstract_inverted_index.NS | 168 |
| abstract_inverted_index.RA | 166 |
| abstract_inverted_index.an | 135 |
| abstract_inverted_index.as | 192 |
| abstract_inverted_index.be | 95 |
| abstract_inverted_index.in | 50, 176, 223 |
| abstract_inverted_index.is | 8, 85, 131 |
| abstract_inverted_index.of | 77, 82, 178, 185 |
| abstract_inverted_index.on | 29, 60, 165 |
| abstract_inverted_index.or | 66 |
| abstract_inverted_index.to | 43, 86, 106, 123, 133, 218 |
| abstract_inverted_index.The | 0, 80, 110, 145, 212 |
| abstract_inverted_index.and | 45, 69, 100, 138, 151, 167, 182, 188, 208, 230 |
| abstract_inverted_index.any | 102 |
| abstract_inverted_index.are | 39 |
| abstract_inverted_index.can | 94 |
| abstract_inverted_index.due | 42 |
| abstract_inverted_index.few | 34 |
| abstract_inverted_index.for | 97, 116, 142 |
| abstract_inverted_index.has | 215 |
| abstract_inverted_index.low | 232 |
| abstract_inverted_index.met | 113 |
| abstract_inverted_index.ten | 160 |
| abstract_inverted_index.the | 114, 143, 156, 183, 189 |
| abstract_inverted_index.78%, | 200 |
| abstract_inverted_index.80%, | 196, 203 |
| abstract_inverted_index.81%, | 207 |
| abstract_inverted_index.81%. | 211 |
| abstract_inverted_index.Five | 171 |
| abstract_inverted_index.GNS3 | 127 |
| abstract_inverted_index.IPv6 | 5, 136 |
| abstract_inverted_index.Many | 23 |
| abstract_inverted_index.When | 48 |
| abstract_inverted_index.been | 216 |
| abstract_inverted_index.both | 149 |
| abstract_inverted_index.flow | 67 |
| abstract_inverted_index.goal | 81 |
| abstract_inverted_index.good | 118 |
| abstract_inverted_index.high | 227 |
| abstract_inverted_index.most | 1 |
| abstract_inverted_index.real | 52 |
| abstract_inverted_index.rely | 28 |
| abstract_inverted_index.that | 58, 93 |
| abstract_inverted_index.this | 83 |
| abstract_inverted_index.tool | 130 |
| abstract_inverted_index.tree | 195 |
| abstract_inverted_index.used | 96, 132 |
| abstract_inverted_index.very | 33 |
| abstract_inverted_index.were | 173, 191 |
| abstract_inverted_index.with | 63, 155, 225 |
| abstract_inverted_index.work | 84 |
| abstract_inverted_index.Bayes | 202 |
| abstract_inverted_index.based | 164 |
| abstract_inverted_index.false | 78 |
| abstract_inverted_index.large | 75 |
| abstract_inverted_index.other | 124 |
| abstract_inverted_index.rate. | 234 |
| abstract_inverted_index.shown | 217 |
| abstract_inverted_index.terms | 177 |
| abstract_inverted_index.their | 121 |
| abstract_inverted_index.today | 7 |
| abstract_inverted_index.type, | 179 |
| abstract_inverted_index.used, | 187 |
| abstract_inverted_index.using | 14 |
| abstract_inverted_index.(DDoS) | 12 |
| abstract_inverted_index.ICMPv6 | 140, 153 |
| abstract_inverted_index.attack | 3, 13, 25, 37, 91, 221 |
| abstract_inverted_index.create | 87 |
| abstract_inverted_index.detect | 107 |
| abstract_inverted_index.naïve | 201 |
| abstract_inverted_index.neural | 209 |
| abstract_inverted_index.normal | 150 |
| abstract_inverted_index.number | 76, 184 |
| abstract_inverted_index.packet | 65 |
| abstract_inverted_index.relies | 59 |
| abstract_inverted_index.system | 57 |
| abstract_inverted_index.tests, | 224 |
| abstract_inverted_index.vector | 198 |
| abstract_inverted_index.Control | 16 |
| abstract_inverted_index.Message | 17 |
| abstract_inverted_index.against | 4 |
| abstract_inverted_index.alerts. | 79 |
| abstract_inverted_index.attacks | 163 |
| abstract_inverted_index.because | 32 |
| abstract_inverted_index.chosen, | 174 |
| abstract_inverted_index.dataset | 62, 92, 214 |
| abstract_inverted_index.machine | 199 |
| abstract_inverted_index.message | 169 |
| abstract_inverted_index.network | 128, 137 |
| abstract_inverted_index.privacy | 44 |
| abstract_inverted_index.results | 190 |
| abstract_inverted_index.support | 197 |
| abstract_inverted_index.systems | 104 |
| abstract_inverted_index.traffic | 141, 147, 158, 222 |
| abstract_inverted_index.tuning, | 98 |
| abstract_inverted_index.varying | 175 |
| abstract_inverted_index.version | 19 |
| abstract_inverted_index.(ICMPv6) | 21 |
| abstract_inverted_index.Internet | 15 |
| abstract_inverted_index.Protocol | 18 |
| abstract_inverted_index.abnormal | 152, 157 |
| abstract_inverted_index.accuracy | 229 |
| abstract_inverted_index.attacks. | 109 |
| abstract_inverted_index.contains | 70, 148 |
| abstract_inverted_index.criteria | 115 |
| abstract_inverted_index.dataset, | 119 |
| abstract_inverted_index.dataset. | 144 |
| abstract_inverted_index.datasets | 31, 38, 112 |
| abstract_inverted_index.decision | 194 |
| abstract_inverted_index.designed | 105 |
| abstract_inverted_index.ensuring | 120 |
| abstract_inverted_index.features | 72, 186 |
| abstract_inverted_index.follows: | 193 |
| abstract_inverted_index.generate | 139 |
| abstract_inverted_index.however, | 54 |
| abstract_inverted_index.network, | 53 |
| abstract_inverted_index.networks | 6, 210 |
| abstract_inverted_index.proposed | 111, 213 |
| abstract_inverted_index.publicly | 40 |
| abstract_inverted_index.security | 46 |
| abstract_inverted_index.simulate | 134 |
| abstract_inverted_index.suitable | 35 |
| abstract_inverted_index.traffic, | 154 |
| abstract_inverted_index.available | 41 |
| abstract_inverted_index.concerns. | 47 |
| abstract_inverted_index.dangerous | 2 |
| abstract_inverted_index.detection | 26, 56, 103, 228 |
| abstract_inverted_index.different | 161 |
| abstract_inverted_index.flooding. | 170 |
| abstract_inverted_index.generated | 146 |
| abstract_inverted_index.generates | 73 |
| abstract_inverted_index.incorrect | 64 |
| abstract_inverted_index.messages. | 22 |
| abstract_inverted_index.represent | 220 |
| abstract_inverted_index.accurately | 219 |
| abstract_inverted_index.containing | 159 |
| abstract_inverted_index.evaluating | 101 |
| abstract_inverted_index.mechanisms | 27 |
| abstract_inverted_index.neighbours | 206 |
| abstract_inverted_index.simulation | 129 |
| abstract_inverted_index.usefulness | 122 |
| abstract_inverted_index.‐nearest | 205 |
| abstract_inverted_index.classifiers | 172 |
| abstract_inverted_index.distributed | 10 |
| abstract_inverted_index.implemented | 49 |
| abstract_inverted_index.unqualified | 71 |
| abstract_inverted_index.performance, | 181 |
| abstract_inverted_index.researchers. | 125 |
| abstract_inverted_index.ICMPv6‐DDoS | 24, 36, 90, 108, 162 |
| abstract_inverted_index.benchmarking, | 99 |
| abstract_inverted_index.comprehensive | 89 |
| abstract_inverted_index.classification | 180 |
| abstract_inverted_index.representation | 68 |
| abstract_inverted_index.self‐created | 30 |
| abstract_inverted_index.false‐positive | 233 |
| abstract_inverted_index.denial‐of‐service | 11 |
| cited_by_percentile_year.max | 98 |
| cited_by_percentile_year.min | 97 |
| corresponding_author_ids | https://openalex.org/A5050294360 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 7 |
| corresponding_institution_ids | https://openalex.org/I139322472, https://openalex.org/I2802535771 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.7200000286102295 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.90209526 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |