Research Article

Labelled Dataset on Distributed Denial-of-Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6)

Table 4

Details of attacks performed.

Attack nameTHC commandICMPv6 flooding attack packetTarget

Attack 1flood_router26 eth0 “interface”Router advertisementAll nodes
Attack 2flood_router26 eth0 interface RRouter advertisementAll nodes
Attack 3flood_router26 interface -R -aRouter advertisementAll nodes
Attack 4flood_router26 interface -R -HRouter advertisementAll nodes
Attack 5flood_router26 eth0 -HRouter advertisementAll nodes
Attack 6flood_router26 eth0 -H -FRouter advertisementAll nodes
Attack 7flood_router26 eth0 -H –sRouter advertisementAll nodes
Attack 8flood_router26 eth0 –mRouter advertisementAll nodes
Attack 9flood_router26 eth0 -GRouter advertisementAll nodes
Attack 10flood_solicitate6 eth0 dest ip addressNeighbour solicitationAll nodes