{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T02:22:21Z","timestamp":1768011741723,"version":"3.49.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2017,4,18]],"date-time":"2017-04-18T00:00:00Z","timestamp":1492473600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004595","name":"Universiti Sains Malaysia","doi-asserted-by":"publisher","award":["304\/PNAV\/6313272"],"award-info":[{"award-number":["304\/PNAV\/6313272"]}],"id":[{"id":"10.13039\/501100004595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s00521-017-2967-y","type":"journal-article","created":{"date-parts":[[2017,4,18]],"date-time":"2017-04-18T08:46:30Z","timestamp":1492505190000},"page":"3815-3824","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Rule-based detection technique for ICMPv6 anomalous behaviour"],"prefix":"10.1007","volume":"30","author":[{"given":"Redhwan M. A.","family":"Saad","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Anbar","sequence":"additional","affiliation":[]},{"given":"Selvakumar","family":"Manickam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,18]]},"reference":[{"key":"2967_CR1","first-page":"1222","volume":"7","author":"HM El-Bakry","year":"2008","unstructured":"El-Bakry HM, Mastorakis N (2008) A real-time intrusion detection algorithm for network security. WSEAS Transactions on Communications 7:1222\u20131228","journal-title":"WSEAS Transactions on Communications"},{"key":"2967_CR2","doi-asserted-by":"crossref","unstructured":"Zeng Z (2010) Intrusion detection system of ipv6 based on protocol analysis. In Multimedia Technology (ICMT), 2010 International Conference on 1\u20134","DOI":"10.1109\/ICMULT.2010.5630380"},{"key":"2967_CR3","first-page":"175","volume":"7","author":"RM Saad","year":"2013","unstructured":"Saad RM, Ramadass S, Manickam S (2013) A study on detecting ICMPv6 flooding attack based on IDS. Aust J Basic Appl Sci 7:175\u2013181","journal-title":"Aust J Basic Appl Sci"},{"key":"2967_CR4","unstructured":"S TechCenter (2013, 20 Sep.). Microsoft Security Bulletin Summary for August 2013. Available: https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms13-aug.aspx"},{"key":"2967_CR5","doi-asserted-by":"crossref","unstructured":"Frankel S and S Krishnan IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap. RFC 6071 February 2011","DOI":"10.17487\/rfc6071"},{"key":"2967_CR6","doi-asserted-by":"crossref","unstructured":"Black D and Koning P Securing Block Storage Protocols over IP: RFC 3723 Requirements Update for IPsec v3. RFC 7146 April2014","DOI":"10.17487\/rfc7146"},{"key":"2967_CR7","first-page":"37","volume":"10","author":"AJ Jara","year":"2014","unstructured":"Jara AJ, Fernandez D, Lopez P, Zamora MA, Skarmeta AF (2014) Lightweight MIPv6 with IPSec support. Mob Inf Syst 10:37\u201377","journal-title":"Mob Inf Syst"},{"key":"2967_CR8","unstructured":"Rantos K, Papanikolaou A and Manifavas C (2013) IPsec over IEEE 802.15. 4 for low power and lossy networks. In Proceedings of the 11th ACM international symposium on Mobility management and wireless access 59\u201364"},{"key":"2967_CR9","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MSP.2012.27","volume":"10","author":"A AlSa'deh","year":"2012","unstructured":"AlSa'deh A, Meinel C (2012) Secure neighbor discovery: review, challenges, perspectives, and recommendations. Security & Privacy IEEE 10:26\u201334","journal-title":"Security & Privacy IEEE"},{"key":"2967_CR10","unstructured":"Gaeil A, Kiyoung K, Jongsoo J, and Yonghee J (2007) Analysis of SEND Protocol through Implementation and Simulation. In Convergence Information Technology. International Conference on 670\u2013676"},{"key":"2967_CR11","unstructured":"Nikander EP, Kempf J, and Nordmark E IPv6 Neighbor Discovery (ND) Trust Models and Threats. Internet Engineering Task Force2004"},{"key":"2967_CR12","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1080\/02564602.2015.1098576","volume":"33","author":"RMA Saad","year":"2016","unstructured":"Saad RMA, Anbar M, Manickam S, Alomari E (2016) An intelligent ICMPv6 DDoS flooding-attack detection framework (v6IIDS) using back-propagation neural network. IETE Tech Rev 33:244\u2013255","journal-title":"IETE Tech Rev"},{"key":"2967_CR13","doi-asserted-by":"crossref","unstructured":"Rafiee H, Alsa'deh A, and Meinel C (2012) Multicore-based auto-scaling SEcure Neighbor Discovery for Windows operating systems. In Information Networking (ICOIN), International Conference on 269\u2013274","DOI":"10.1109\/ICOIN.2012.6164390"},{"key":"2967_CR14","doi-asserted-by":"crossref","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A Patcha","year":"2007","unstructured":"Patcha A, Park J-M (2007) An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput Netw 51:3448\u20133470","journal-title":"Comput Netw"},{"key":"2967_CR15","unstructured":"Roesch M (2014) Snort, intrusion detection system"},{"key":"2967_CR16","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro P, Diaz-Verdejo J, Maci\u00e1-Fern\u00e1ndez G, V\u00e1zquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Computers & Security 28:18\u201328","journal-title":"Computers & Security"},{"key":"2967_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","volume":"10","author":"SX Wu","year":"2010","unstructured":"Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput 10:1\u201335","journal-title":"Appl Soft Comput"},{"key":"2967_CR18","doi-asserted-by":"crossref","first-page":"26","DOI":"10.5120\/3399-4730","volume":"28","author":"V Jyothsna","year":"2011","unstructured":"Jyothsna V, Prasad VR, Prasad KM (2011) A review of anomaly based intrusion detection systems. International Journal of Computer Applications 28:26\u201335","journal-title":"International Journal of Computer Applications"},{"key":"2967_CR19","doi-asserted-by":"crossref","unstructured":"Abouabdalla O, El-Taj H, Manasrah A, and Ramadass S (2009) False positive reduction in intrusion detection system: A survey. In Broadband Network & Multimedia Technology. IC-BNMT'09. 2nd IEEE International Conference on, 2009 463\u2013466","DOI":"10.1109\/ICBNMT.2009.5348536"},{"key":"2967_CR20","doi-asserted-by":"crossref","unstructured":"Mitra A, Najjar W, and Bhuyan L (2007) Compiling pcre to fpga for accelerating Snort IDS. In Proceedings of the 3rd ACM\/IEEE Symposium on Architecture for networking and communications systems 127\u2013136","DOI":"10.1145\/1323548.1323571"},{"key":"2967_CR21","doi-asserted-by":"crossref","unstructured":"Ektefa M, Memar S, Sidi F, and Affendey LS (2010) Intrusion detection using data mining techniques. In Information Retrieval & Knowledge Management, (CAMP), International Conference on 2010 200\u2013203","DOI":"10.1109\/INFRKM.2010.5466919"},{"key":"2967_CR22","unstructured":"McAfee Denial-of-Service (DoS) Prevention Techniques (2013) McAfee, Inc. Network Security Platfor"},{"key":"2967_CR23","doi-asserted-by":"crossref","unstructured":"Das D, Sharma U, and Bhattacharyya D (2011) Detection of HTTP flooding attacks in multiple scenarios. In Proceedings of the 2011 International Conference on Communication, Computing & Security 517\u2013522","DOI":"10.1145\/1947940.1948047"},{"key":"2967_CR24","doi-asserted-by":"crossref","unstructured":"Raghavan S and Dawson E (2011) An Investigation Into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection: Springer Science & Business Media","DOI":"10.1007\/978-81-322-0277-6"},{"key":"2967_CR25","unstructured":"THC (2015) THC-IPv6 Attack Toolkit. Available: https:\/\/www.thc.org\/thc-ipv6\/"},{"key":"2967_CR26","unstructured":"Saad RM, Manickam S, AlomariI E, Anbar M, and Singh P (2014) Design & deployment of testbed based on icmpv6 flooding attack. Journal of Theoretical & Applied Information Technology 64"},{"key":"2967_CR27","first-page":"1825","volume":"5","author":"H Tang","year":"2009","unstructured":"Tang H, Cao Z (2009) Machine learning-based intrusion detection algorithms. Journal of Computational Information Systems 5:1825\u20131831","journal-title":"Journal of Computational Information Systems"},{"key":"2967_CR28","first-page":"15","volume":"8","author":"A Osareh","year":"2008","unstructured":"Osareh A, Shadgar B (2008) Intrusion detection in computer networks based on machine learning algorithms. Int J Comput Sci Netw Secur (IJCSNS) 8:15\u201323","journal-title":"Int J Comput Sci Netw Secur (IJCSNS)"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-017-2967-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-017-2967-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-017-2967-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T01:39:32Z","timestamp":1569029972000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-017-2967-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,18]]},"references-count":28,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["2967"],"URL":"https:\/\/doi.org\/10.1007\/s00521-017-2967-y","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,18]]}}}