Abstract
Reliable and timely detection of cyberattacks is becoming indispensable for securing networks and systems. Internet Control Message Protocol (ICMP) flood attacks continue to be one of the most serious threats in both IPv4 and IPv6 networks. There are various types of cybersecurity attacks based on ICMP protocols. Many ICMP protocols are very similar, so security managers might think they might have the same impact on the victim's computer systems or servers.
Cite
CITATION STYLE
Razumov, P. V., Cherckesova, L. V., Safaryan, O. A., & Trubchik, I. S. (2021). Smurf as Spoof Type Attacking Activity on Network and Neutralization. In Journal of Physics: Conference Series (Vol. 2131). IOP Publishing Ltd. https://doi.org/10.1088/1742-6596/2131/2/022078
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.