{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T05:57:10Z","timestamp":1726207030967},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/apsipa.2017.8282169","type":"proceedings-article","created":{"date-parts":[[2018,2,14]],"date-time":"2018-02-14T20:31:33Z","timestamp":1518640293000},"page":"1000-1005","source":"Crossref","is-referenced-by-count":3,"title":["Defence mechanisms evaluation against RA flood attacks for Linux-victim node"],"prefix":"10.1109","author":[{"given":"Samad S.","family":"Kolahi","sequence":"first","affiliation":[]},{"given":"Bashar","family":"Barmada","sequence":"additional","affiliation":[]},{"given":"Keysha","family":"Mudaliar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4861"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7113"},{"journal-title":"Kali Linux Penetration Testing Tools","year":"0","key":"ref12"},{"journal-title":"Si6 networks' ipv6 toolkit","year":"0","key":"ref13"},{"journal-title":"Scapy","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSPA.2015.7081286"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1109\/CITS.2015.7297731","article-title":"Analysis of UDP DDoS Cyber Flood Attack and Defense Mechanisms on Windows Sever 2012 and Linux Ubuntu 13","author":"treseangrat","year":"2015","journal-title":"International Conference on Computer Information and Telecommunication Systems (CITS)"},{"journal-title":"Guidelines for the Secure Deployment of IPv6 (Draft)","year":"2010","author":"frankel","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6104"},{"key":"ref19","article-title":"Source Address Validation Improvement (SA VI) Threat Scope","author":"mcpherson","year":"2013","journal-title":"Internet Engineering Task Force (IETF) Request for Comments 6959"},{"journal-title":"So you've got IPv6 address space Can you defend it?","year":"2014","author":"sande","key":"ref4"},{"journal-title":"Network Security Firewalls and Vpns","year":"2013","author":"stewart","key":"ref3"},{"key":"ref6","article-title":"Security Implications of IPv6 Fragmentation with IPv6 Neighbour Discovery","author":"gont","year":"2013","journal-title":"RFC 6980"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/RFID-TA.2013.6694519"},{"key":"ref8","article-title":"Development of a Snort IPv6 Plugin-Detection of Attacks on the Neighbor Discovery Protocol","author":"schutte","year":"2012","journal-title":"International Conference on Security and Cryptography"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3844\/ajassp.2014.1472.1479"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT.2014.7002093"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2010.03.862"},{"journal-title":"A Complete Guide on IPv6 Attack and Defence","year":"2012","author":"pilihanto","key":"ref9"},{"key":"ref20","article-title":"What is wrong with the IPv6 RA protocol? Some analysis and proposed solutions","author":"grob","year":"2012","journal-title":"IPv6-Kongress"}],"event":{"name":"2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","start":{"date-parts":[[2017,12,12]]},"location":"Kuala Lumpur","end":{"date-parts":[[2017,12,15]]}},"container-title":["2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8270695\/8281978\/08282169.pdf?arnumber=8282169","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T00:21:26Z","timestamp":1570753286000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8282169\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/apsipa.2017.8282169","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}