Smurf as Spoof Type Attacking Activity on Network and Neutralization

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Reliable and timely detection of cyberattacks is becoming indispensable for securing networks and systems. Internet Control Message Protocol (ICMP) flood attacks continue to be one of the most serious threats in both IPv4 and IPv6 networks. There are various types of cybersecurity attacks based on ICMP protocols. Many ICMP protocols are very similar, so security managers might think they might have the same impact on the victim's computer systems or servers.

Cite

CITATION STYLE

APA

Razumov, P. V., Cherckesova, L. V., Safaryan, O. A., & Trubchik, I. S. (2021). Smurf as Spoof Type Attacking Activity on Network and Neutralization. In Journal of Physics: Conference Series (Vol. 2131). IOP Publishing Ltd. https://doi.org/10.1088/1742-6596/2131/2/022078

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free