Research Article
Labelled Dataset on Distributed Denial-of-Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6)
Table 8
The comparison between the proposed datasets and existing IPv6 datasets.
| No. | Dataset | Network configurations | Labelled | Attack scenarios | Number of features | Online |
| 1 | MAWI [37] | Unavailable | No | Normal traffic only | 10 | Available | 2 | CAIDA [32] | Unavailable | No | Nondiverse | Limited | Available | 3 | Zulkiflee et al. [41] | Available | Yes | Three IPv6 attack scenarios | 6 | Unavailable | 4 | Najjar and Kadhum [31] | Available | No | Two DDoS attack scenarios | 7 | Unavailable | 5 | Saad et al. [34] | Available | Yes | Echo request | 8 | Unavailable | 6 | Omer et al. [17] | Available | Yes | Diverse | 11 | Available | 7 | Proposed dataset | Available | Yes | Diverse | 21 | Will be available |
|
|