{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:05:42Z","timestamp":1771517142328,"version":"3.50.1"},"reference-count":91,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004595","name":"Universiti Sains Malaysia (USM) Research University","doi-asserted-by":"publisher","award":["1001\/PKOMP\/8014018"],"award-info":[{"award-number":["1001\/PKOMP\/8014018"]}],"id":[{"id":"10.13039\/501100004595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3022963","type":"journal-article","created":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T20:16:47Z","timestamp":1599682607000},"page":"170529-170547","source":"Crossref","is-referenced-by-count":49,"title":["ICMPv6-Based DoS and DDoS Attacks Detection Using Machine Learning Techniques, Open Challenges, and Blockchain Applicability: A Review"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6735-9451","authenticated-orcid":false,"given":"Mohammad","family":"Tayyab","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9099-1498","authenticated-orcid":false,"given":"Bahari","family":"Belaton","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7026-6408","authenticated-orcid":false,"given":"Mohammed","family":"Anbar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","first-page":"1","article-title":"Locally weighted learning","volume":"1","author":"englert","year":"2012","journal-title":"Seminar Class on Autonomous Learning Systems"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3700"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE.2018.00028"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-018-3149-7"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9804061"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854567"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-0373-7.ch008"},{"key":"ref39","first-page":"34","article-title":"An intrusion detection system for fog computing and iot based logistic systems using a smart data approach","volume":"10","author":"hosseinpour","year":"2016","journal-title":"Int J Digit Content Technol Appl"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9649643"},{"key":"ref79","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2020.102630","article-title":"Machine learning based solutions for security of Internet of Things (IoT): A survey","volume":"161","author":"tahsien","year":"2020","journal-title":"J Netw Comput Appl"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1166\/asl.2017.10272"},{"key":"ref31","first-page":"603","article-title":"Review of security vulnerabilities in the IPv6 neighbor discovery protocol","volume":"376","author":"anbar","year":"2016","journal-title":"Information Science and Applications"},{"key":"ref30","first-page":"5","article-title":"IPv6 security: Attacks and countermeasures in a nutshell","author":"ullrich","year":"2014","journal-title":"Proc Usenix Conf Offensive Technol (WOOT)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.05.049"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2896380"},{"key":"ref35","article-title":"IPv6 security test laboratory","author":"weber","year":"2013"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3301614","article-title":"Software-defined networking-based DDoS defense mechanisms","volume":"52","author":"swami","year":"2019","journal-title":"ACM Comput Surv"},{"key":"ref60","year":"1999","journal-title":"KDDCup 1999 Data"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32213-1_12"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2015.1098576"},{"key":"ref63","article-title":"A strict anomaly detection model for IDS","volume":"38","author":"sasha","year":"2000"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3810"},{"key":"ref64","author":"hauser","year":"2020","journal-title":"The Hackers Choice (THC) IPv6 Attack Toolkit"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2007.4455200"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2841987"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2388576.2388600"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-017-9519-8"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906975"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCCN.2018.8748290"},{"key":"ref2","author":"conta","year":"2006","journal-title":"Internet Control Message Protocol (ICMPv6)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2737524"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.jnca.2016.01.001","article-title":"Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework","volume":"67","author":"osanaiye","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-3872-4_110"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2070425.2070444"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.107341"},{"key":"ref23","first-page":"183","article-title":"Local network security","author":"scott","year":"2008","journal-title":"IPv6 Security (Network Technology Series)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/I4CT.2015.7219590"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1981"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2014\/v7i2.5"},{"key":"ref51","first-page":"87","article-title":"ECM-A novel on-line, evolving clustering method and its applications","author":"song","year":"2001","journal-title":"Proc 5th Biannual Conf Artif Neural Netw Expert Syst"},{"key":"ref91","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-3-319-99843-5_10","article-title":"Towards blockchain-based collaborative intrusion detection systems","volume":"10707","author":"alexopoulos","year":"2018","journal-title":"Critical Information Infrastructures Security"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799854"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON.2015.7443752"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/978-3-540-71605-1_12","article-title":"Geometric particle swarm optimisation","volume":"4445","author":"moraglio","year":"2007","journal-title":"Proc 5th Eur Conf Genet Program (EuroGP)"},{"key":"ref57","first-page":"399","article-title":"A framework of features selection for IPv6 network attacks detection","volume":"14","author":"zulkiflee","year":"2015","journal-title":"WSEAS Trans Commun"},{"key":"ref56","first-page":"478","article-title":"Fast algorithms for mining association rules","author":"agrawal","year":"1994","journal-title":"Proc 20th Int Conf Very Large Data Bases (VLDB)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02617-1_62"},{"key":"ref54","first-page":"1","article-title":"Detection and classification of covert channels in IPv6 using enhanced machine learning","author":"salih","year":"2015","journal-title":"Proc Int Conf Comput Technol Inf Syst (ICCTIS)"},{"key":"ref53","first-page":"153","article-title":"Overview of IPv6 based DDoS and DoS attacks detection mechanisms","volume":"1132","author":"bahashwan","year":"2020","journal-title":"Proc Int Conf Adv Cyber Secur (ACeS)"},{"key":"ref52","article-title":"Flow-representation approach for ICMPV6-based DDOS attacks setection","author":"elejla","year":"2018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/91.995117"},{"key":"ref11","year":"2020","journal-title":"Percentage of Users that Access Google Over IPv6"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2871719"},{"key":"ref12","article-title":"Internet protocol version six (IPv6) at UC Davis: Traffic analysis with a security perspective","author":"ard","year":"2012"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2019.1604173"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-018-3643-y"},{"key":"ref15","year":"2020","journal-title":"WOrld Internet Usage and Population Statistics"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6550"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2460"},{"key":"ref81","author":"montenegro","year":"2007","journal-title":"Transmission of IPv6 Packets over IEEE 802 15 4 Networks"},{"key":"ref17","year":"2012"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2633228"},{"key":"ref18","author":"krishnan","year":"2011","journal-title":"IP Security (IPSEC)"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3395352.3402621"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref80","first-page":"109","article-title":"A study of DDoS reflection attack on Internet of Things in IPv4\/IPv6 networks","author":"\u0161imon","year":"2019","journal-title":"Proc Comput Sci Line Conf Cham"},{"key":"ref89","first-page":"203","article-title":"Collision free hash functions and public key signature schemes","volume":"304","author":"damg\u00e5rd","year":"1988","journal-title":"Advances in Cryptology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970787"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4861"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2016.1192964"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-2967-y"},{"key":"ref85","first-page":"374","article-title":"Denial-of-service attacks and countermeasures in the RPL-based Internet of Things","author":"ioulianou","year":"2019","journal-title":"Computer Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0058-9_20"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/794326"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2812-8"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1993.1.3.191"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196791"},{"key":"ref88","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/978-981-13-2622-6_34","article-title":"Comparison of classification algorithms on ICMPv6-based DDoS attacks detection","volume":"481","author":"elejla","year":"2019","journal-title":"Computer Science and Technology"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994079"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SKG.2006.5"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.05.009"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06986-8"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-3319-7"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2872784"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09189788.pdf?arnumber=9189788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T22:18:34Z","timestamp":1643149114000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9189788\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":91,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3022963","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}