Research Article
Labelled Dataset on Distributed Denial-of-Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6)
Table 4
Details of attacks performed.
| Attack name | THC command | ICMPv6 flooding attack packet | Target |
| Attack 1 | flood_router26 eth0 “interface” | Router advertisement | All nodes | Attack 2 | flood_router26 eth0 interface R | Router advertisement | All nodes | Attack 3 | flood_router26 interface -R -a | Router advertisement | All nodes | Attack 4 | flood_router26 interface -R -H | Router advertisement | All nodes | Attack 5 | flood_router26 eth0 -H | Router advertisement | All nodes | Attack 6 | flood_router26 eth0 -H -F | Router advertisement | All nodes | Attack 7 | flood_router26 eth0 -H –s | Router advertisement | All nodes | Attack 8 | flood_router26 eth0 –m | Router advertisement | All nodes | Attack 9 | flood_router26 eth0 -G | Router advertisement | All nodes | Attack 10 | flood_solicitate6 eth0 dest ip address | Neighbour solicitation | All nodes |
|
|