{"id":"https://openalex.org/W2625204818","doi":"https://doi.org/10.1007/978-3-319-60774-0_11","title":"Flow-Based Detection of IPv6-specific Network Layer Attacks","display_name":"Flow-Based Detection of IPv6-specific Network Layer Attacks","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2625204818","doi":"https://doi.org/10.1007/978-3-319-60774-0_11","mag":"2625204818"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-60774-0_11","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-319-60774-0_11","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-319-60774-0_11.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-319-60774-0_11.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068144761","display_name":"Luuk Hendriks","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Luuk Hendriks","raw_affiliation_strings":["Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044735319","display_name":"Petr Velan","orcid":"https://orcid.org/0000-0002-2824-4299"},"institutions":[{"id":"https://openalex.org/I54634078","display_name":"Czech Education and Scientific Network","ror":"https://ror.org/050dkka69","country_code":"CZ","type":"other","lineage":["https://openalex.org/I54634078"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Petr Velan","raw_affiliation_strings":["CESNET, a.l.e, Zikova 4, 160 00, Prague 6, Czech Republic"],"affiliations":[{"raw_affiliation_string":"CESNET, a.l.e, Zikova 4, 160 00, Prague 6, Czech Republic","institution_ids":["https://openalex.org/I54634078"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111930228","display_name":"Ricardo de O. Schmidt","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Ricardo de O. Schmidt","raw_affiliation_strings":["Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085616535","display_name":"Pieter-Tjerk de Boer","orcid":"https://orcid.org/0000-0002-0818-5295"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Pieter-Tjerk de Boer","raw_affiliation_strings":["Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067140003","display_name":"Aiko Pras","orcid":"https://orcid.org/0000-0002-5091-8608"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Aiko Pras","raw_affiliation_strings":["Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5068144761"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":1.6829,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.84683099,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"137","last_page":"142"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9797999858856201,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/netflow","display_name":"NetFlow","score":0.9127922058105469},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.8665082454681396},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8532019257545471},{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.7871145009994507},{"id":"https://openalex.org/keywords/ipv4","display_name":"IPv4","score":0.7131068706512451},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4845673143863678},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.47200867533683777},{"id":"https://openalex.org/keywords/flow-network","display_name":"Flow network","score":0.47078222036361694},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44444042444229126},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.4266819953918457},{"id":"https://openalex.org/keywords/network-layer","display_name":"Network layer","score":0.4130847454071045},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.4076228439807892},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3451591730117798},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3059573173522949},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16837379336357117},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.08430266380310059}],"concepts":[{"id":"https://openalex.org/C188067584","wikidata":"https://www.wikidata.org/wiki/Q219363","display_name":"NetFlow","level":2,"score":0.9127922058105469},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.8665082454681396},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8532019257545471},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.7871145009994507},{"id":"https://openalex.org/C2779233093","wikidata":"https://www.wikidata.org/wiki/Q11103","display_name":"IPv4","level":4,"score":0.7131068706512451},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4845673143863678},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47200867533683777},{"id":"https://openalex.org/C114809511","wikidata":"https://www.wikidata.org/wiki/Q1412924","display_name":"Flow network","level":2,"score":0.47078222036361694},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44444042444229126},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.4266819953918457},{"id":"https://openalex.org/C117468950","wikidata":"https://www.wikidata.org/wiki/Q208074","display_name":"Network layer","level":3,"score":0.4130847454071045},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.4076228439807892},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3451591730117798},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3059573173522949},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16837379336357117},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.08430266380310059},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-319-60774-0_11","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-319-60774-0_11","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-319-60774-0_11.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/2fd77bd5-7078-4ede-96fb-7a41a65042d3","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/2fd77bd5-7078-4ede-96fb-7a41a65042d3","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Hendriks, L, Velan, P, de O. Schmidt, R, de Boer, P-T & Pras, A 2017, Flow-based detection of IPv6-specific network layer attacks. in D Tuncer, R Koch, R Badonne & B Stiller (eds), Security of Networks and Services in an All-Connected World : 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Proceedings. Lecture Notes in Computer Science, vol. 10356, Lecture Notes in Computer Communication Networks and Telecommunications, Springer, Cham, pp. 137-142, 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, 10/07/17. https://doi.org/10.1007/978-3-319-60774-0_11","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:HAL:hal-01806050v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01806050","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.137-142, &#x27E8;10.1007/978-3-319-60774-0_11&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:is.muni.cz:1385934","is_oa":true,"landing_page_url":"https://is.muni.cz/repo/1385934","pdf_url":null,"source":{"id":"https://openalex.org/S4306400102","display_name":"Ve\u0159ejn\u00e9 slu\u017eby Informa\u010dn\u00edho syst\u00e9mu (Masarykiana Brunensis Universitas)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"AIMS 2017 - 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1007/978-3-319-60774-0_11","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-319-60774-0_11","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-319-60774-0_11.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1076797115","display_name":null,"funder_award_id":"co-funded","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"},{"id":"https://openalex.org/G176604203","display_name":null,"funder_award_id":"02.1.01/0.0/0.0","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"},{"id":"https://openalex.org/G291036901","display_name":null,"funder_award_id":"CZ.02","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"},{"id":"https://openalex.org/G3193936444","display_name":null,"funder_award_id":"20162019","funder_id":"https://openalex.org/F4320321005","funder_display_name":"Ministerstvo \u0160kolstv\u00ed, Ml\u00e1de\u017ee a T\u011blov\u00fdchovy"},{"id":"https://openalex.org/G3490171961","display_name":null,"funder_award_id":"CZ.02.1.01","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"},{"id":"https://openalex.org/G3711331958","display_name":null,"funder_award_id":"CZ.02.1.01/0.0/0.0/16","funder_id":"https://openalex.org/F4320321005","funder_display_name":"Ministerstvo \u0160kolstv\u00ed, Ml\u00e1de\u017ee a T\u011blov\u00fdchovy"},{"id":"https://openalex.org/G5641063287","display_name":null,"funder_award_id":"CZ.02.1.01","funder_id":"https://openalex.org/F4320321005","funder_display_name":"Ministerstvo \u0160kolstv\u00ed, Ml\u00e1de\u017ee a T\u011blov\u00fdchovy"},{"id":"https://openalex.org/G5916014575","display_name":null,"funder_award_id":"CZ.02.1.01/0.0/0.0","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"},{"id":"https://openalex.org/G6594491356","display_name":null,"funder_award_id":"CZ.02.1.01/0.0/0.0/","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"},{"id":"https://openalex.org/G8320565317","display_name":null,"funder_award_id":"VI20162019029","funder_id":"https://openalex.org/F4320311333","funder_display_name":"Ministerstvo Vnitra \u010cesk\u00e9 Republiky"}],"funders":[{"id":"https://openalex.org/F4320311333","display_name":"Ministerstvo Vnitra \u010cesk\u00e9 Republiky","ror":"https://ror.org/05w1nn565"},{"id":"https://openalex.org/F4320321005","display_name":"Ministerstvo \u0160kolstv\u00ed, Ml\u00e1de\u017ee a T\u011blov\u00fdchovy","ror":"https://ror.org/037n8p820"},{"id":"https://openalex.org/F4320335322","display_name":"European Regional Development Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2625204818.pdf","grobid_xml":"https://content.openalex.org/works/W2625204818.grobid-xml"},"referenced_works_count":2,"referenced_works":["https://openalex.org/W1851526348","https://openalex.org/W2004013580"],"related_works":["https://openalex.org/W2810972022","https://openalex.org/W1980872188","https://openalex.org/W101647458","https://openalex.org/W2393656576","https://openalex.org/W1606232132","https://openalex.org/W2741094575","https://openalex.org/W2409388891","https://openalex.org/W2350336358","https://openalex.org/W2496291889","https://openalex.org/W4249987491"],"abstract_inverted_index":{"Abstract":[0],"With":[1],"a":[2,87],"vastly":[3],"different":[4],"header":[5],"format,":[6],"IPv6":[7,25],"introduces":[8],"new":[9,17],"vulnerabilities":[10],"not":[11],"possible":[12,30],"in":[13,34,86],"IPv4,":[14],"potentially":[15],"requiring":[16],"detection":[18,38,66],"algorithms.":[19],"While":[20],"many":[21],"attacks":[22,42,54,95],"specific":[23],"to":[24,28],"have":[26,43],"proven":[27],"be":[29,57,68],"and":[31,51,76,93],"are":[32],"described":[33],"the":[35,97],"literature,":[36],"no":[37],"solutions":[39],"for":[40],"these":[41,84],"been":[44],"proposed.":[45],"In":[46],"this":[47],"study":[48],"we":[49,82],"identify":[50],"characterise":[52],"IPv6-specific":[53],"that":[55],"can":[56,67],"detected":[58],"using":[59,70],"flow":[60],"monitoring.":[61],"By":[62],"constructing":[63],"flow-based":[64],"signatures,":[65],"performed":[69],"available":[71],"technologies":[72],"such":[73],"as":[74],"NetFlow":[75],"IPFIX.":[77],"To":[78],"validate":[79],"our":[80],"approach,":[81],"implemented":[83],"signatures":[85],"prototype,":[88],"monitoring":[89],"two":[90],"production":[91,98],"networks":[92],"injecting":[94],"into":[96],"traffic.":[99]},"counts_by_year":[{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
