2018
DOI: 10.1007/s13369-018-3643-y
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Defense Mechanisms on Duplicate Address Detection Process in IPv6 Link-Local Network: A Survey on Limitations and Requirements

Abstract: The deployment of Internet Protocol Version 6 (IPv6) has progressed at a rapid pace. IPv6 has introduced new features and capabilities that is not available in IPv4. However, new security risks and challenges emerge with any new technology. Similarly, Duplicate Address Detection (DAD), part of Neighbor Discovery Protocol in IPv6 protocol, is subject to security threats such as denial-of-service attacks. This paper presents a comprehensive review on detection and defense mechanisms for DAD on fixed network. The… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

4
2

Authors

Journals

citations
Cited by 14 publications
(14 citation statements)
references
References 67 publications
0
11
0
Order By: Relevance
“…Therefore, these hosts are unable to join the IPv6 network and communicate with other hosts in the network. This type of attack is referred to as a DoS-on-DAD, which prevents hosts from configuring IP addresses in an IPv6 link-local network, as revealed in previous studies [15]. Figure 3 illustrates a DoS-on-DAD attack in an IPv6 link-local network.…”
Section: Duplicate Address Detection and Its Security Challengesmentioning
confidence: 91%
See 2 more Smart Citations
“…Therefore, these hosts are unable to join the IPv6 network and communicate with other hosts in the network. This type of attack is referred to as a DoS-on-DAD, which prevents hosts from configuring IP addresses in an IPv6 link-local network, as revealed in previous studies [15]. Figure 3 illustrates a DoS-on-DAD attack in an IPv6 link-local network.…”
Section: Duplicate Address Detection and Its Security Challengesmentioning
confidence: 91%
“…Therefore, INDPmon can also warn the network of NDP attacks because the majority of these attacks violate the protocol rules. Previous studies [10], [15] show that INDPmon can only identify NDP attacks that violate the fundamental protocols (i.e. protocol-rule-related violations).…”
Section: A Network Monitoring Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…The OpenFlow network has three main components which are OpenFlow Controller, OpenFlow Switches and OpenFlow protocol as shown in Fig 6. In the OpenFlow network, the OpenFlow controller manages the entire network. The controller is considered the brain of the OpenFlow network [23]. The controller maintains network topology information, installs the instruction in all OpenFlow devices and monitors the network status network.…”
Section: Openflowmentioning
confidence: 99%
“…IPv4 was originally designed to provide IP addresses up to 4.29 billion [14]. Nevertheless, IP addresses provided by the IPv4 have already raised the issue of address depletion where the number of active internet users in 2019 exceeds 4.53 billion [15].…”
Section: Introductionmentioning
confidence: 99%