2023
DOI: 10.31449/inf.v46i9.4441
|View full text |Cite
|
Sign up to set email alerts
|

SADetection: Security Mechanisms to Detect SLAAC Attack in IPv6 Link-Local Network

Abstract: Neighbour Discovery Protocol (NDP) attacks are a serious security concern for IPv6. Attackers utilize the Stateless Address Auto-configuration (SLAAC) NDP attack type of targeting the SLAAC process. SLAAC attacks can compromise an IPv6 link-local network and expose private data. Attack detection mechanisms, including RA-Guard, Snort IPv6 Plugin, SLAAC detection method by Buenaventura et al., and SLAAC Security Method by Massamba et al. have been proposed by researchers to address this issue. However, the detec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Mitigation strategies include RA-Guard, SEND, network segmentation, and regular updates to prevent these security risks in IPv6 networks. 18 In an IPv6-based IoD network, the DAD protocol plays a critical role in ensuring the uniqueness of drone addresses. When a new drone joins the network, a provisional IPv6 address is generated.…”
Section: Duplicate Address Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Mitigation strategies include RA-Guard, SEND, network segmentation, and regular updates to prevent these security risks in IPv6 networks. 18 In an IPv6-based IoD network, the DAD protocol plays a critical role in ensuring the uniqueness of drone addresses. When a new drone joins the network, a provisional IPv6 address is generated.…”
Section: Duplicate Address Detectionmentioning
confidence: 99%
“…SLAAC attacks exploit vulnerabilities in IPv6 autoconfiguration, enabling malicious activities like spoofing, rogue router advertisements, and neighbor discovery protocol manipulation. Mitigation strategies include RA‐Guard, SEND, network segmentation, and regular updates to prevent these security risks in IPv6 networks 18 …”
Section: Introductionmentioning
confidence: 99%
“…In addition, rules-based detection techniques are used to detect any violation of the network configuration or the fragmentation of RA messages and extension headers [17][18][19]. The main drawback of passive monitoring is that the training phase must be free of any compromised nodes; otherwise, the detection process will fail [20,21]. For that, [22,23] suggest dynamically updating the rules whenever a legitimate change on the network appears.…”
Section: Related Work For Securing Ndpmentioning
confidence: 99%
“…Their proposal discards the misleading and confounding frames and generates a compact, refined feature for face recognition in face videos. For channel attention, the current channel attention mechanisms used in face recognition [34]- [37] employ a scalar to represent each channel through Global Average Pooling (GAP). However, GAP struggles to capture complex information for various inputs because of its simplicity.…”
Section: Introductionmentioning
confidence: 99%