2017
DOI: 10.1109/tifs.2017.2695983
|View full text |Cite
|
Sign up to set email alerts
|

Securing ARP/NDP From the Ground Up

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…However, some studies of the conceptual contribution type have provided a comprehensive survey of IPv6 transition methods with a focus on security 32 . There are also other studies that examining the detection of special attacks in dual stack networks such as spoofing 33 , ICMPv6 DoS flooding 34 , and anomaly behaviors 35 .…”
Section: Literature Classificationmentioning
confidence: 99%
“…However, some studies of the conceptual contribution type have provided a comprehensive survey of IPv6 transition methods with a focus on security 32 . There are also other studies that examining the detection of special attacks in dual stack networks such as spoofing 33 , ICMPv6 DoS flooding 34 , and anomaly behaviors 35 .…”
Section: Literature Classificationmentioning
confidence: 99%
“…Due to the absence of a trust mechanism in the standard protocol, the host is unable to verify the legitimacy of the gateway router throughout the normal router discovery (RD) procedure. This flaw enables fake routers to be set up as valid gateways [17]. The attacker will spread a fake router advertisement (RA) message and give the host the ability to set up a fake set of router options.…”
Section: Introductionmentioning
confidence: 99%
“…In NDP, Neighbor Advertisement (NA) and Neighbor Solicitation (NS) packets are used to resolve MAC addresses of the connected hosts. Although unsolicited NS messages are ignored in IPv6, MAC spoofing attack is still possible [12]. Liu et al showed that the override flag in the NS packet could be used to distort the NCE table and perform hijacking of traffic [13].…”
Section: Introductionmentioning
confidence: 99%