2021
DOI: 10.1109/access.2021.3066630
|View full text |Cite
|
Sign up to set email alerts
|

Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)

Abstract: Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it vulnerable to many types of attacks, such as Router Advertisement (RA) and Neighbour Solicitation (NS) DoS flooding attacks. In these types of attacks, attackers send an enormous volume of abnormal NDP traffic, which causes congestion that degrades network performance. The expected behavior among these attacks is the existence of ND… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 52 publications
0
4
0
Order By: Relevance
“…In this paper, the effectiveness of the proposed system was evaluated using performance metrics such as detection accuracy rate, shown in Eq. ( 6) [33][34].…”
Section: Resultsmentioning
confidence: 99%
“…In this paper, the effectiveness of the proposed system was evaluated using performance metrics such as detection accuracy rate, shown in Eq. ( 6) [33][34].…”
Section: Resultsmentioning
confidence: 99%
“…Compared with the traditional ordinary average distance algorithm, the above decision method adds each type of sample point and set the idea of "holistic decision-making." Researchers are proposing various protocol schemes [24][25][26][27][28] to maintain integrity, confidentiality, and security of the information shared among users and servers.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…5, October 2023: 5617-5631 5618 inherently secure. As a result, all IPv6 nodes in any link-local network are vulnerable to ICMPv6-based distributed denial of service (DDoS) attacks and exposed to spoofed ICMPv6 packets [2].…”
Section: Introductionmentioning
confidence: 99%