2016
DOI: 10.1007/978-3-319-32213-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Neighbor Discovery Protocol-Based Flooding Attack Using Machine Learning Techniques

Abstract: Neighbor Discovery Protocol (NDP) is stateless and lacks of authentication which exposes it to flooding attacks. Securing NDP is critical due to the large deployment of open network. Commonly existing solutions for securing NDP violate its design principle in terms of overhead and complexity. Other solutions suffer from high false positive alerts which affects solution trustiness. This paper aims to investigate the use of machine learning mechanism for detecting NDP flooding attacks. It was found that the adva… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…In addition, the classifier's ability to learn and build the model mainly depends upon the feature set and the solution to class imbalance factors existing in the dataset. The models such as [48], [62], and [70] lack features selection schemes needed to validate the relevance of the features in generating the datasets. Table 4 gives an insight into the scope of detection that is covered by each ML-based IDS model for ICMPv6-based DoS and DDoS attacks.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, the classifier's ability to learn and build the model mainly depends upon the feature set and the solution to class imbalance factors existing in the dataset. The models such as [48], [62], and [70] lack features selection schemes needed to validate the relevance of the features in generating the datasets. Table 4 gives an insight into the scope of detection that is covered by each ML-based IDS model for ICMPv6-based DoS and DDoS attacks.…”
Section: Discussionmentioning
confidence: 99%
“…Najjar et al [62] used a strict anomaly detection approach introduced by Sasha and Beetle [63] to detect violations in normal RS and NS packets flow. A feature set containing eight features is used to distinguish between normal or anomaly flow against the protocol constant values defined in [RFC 4861 and RFC 4862] for NDP messages.…”
Section: B Single Classifier-based Ids 1) Packet Features-based Idssmentioning
confidence: 99%
See 1 more Smart Citation
“…The addresses are fabricated with the subnet prefix and packets are continuously being sent to the victims in such type of attack. After sending neighbor solicitation packets, these addresses are resolved by the last hop router (Najjar et al, 2016). From the last hop router, the neighbor discovery service is not obtained by a legitimate host attempting to enter the network as it will be already busy with sending other solicitations.…”
Section: Neighbor Discovery Dos Attackmentioning
confidence: 99%
“…There are two categories of NDP functionalities, which involve host-to-host and host-to-router functionalities [9]. Host-host functionalities determine direct host reachability, IP destination address of the datagram, Duplicate Address Detection (DAD), and Neighbor Unreachability Detection (NUD) or determination based on the address resolution, if a selected address is already present in the link-local network, as a basis for determining the next hop.…”
Section: ) Router Solicitationmentioning
confidence: 99%