Rule-based detection technique for ICMPv6 anomalous behaviour

被引:7
|
作者
Saad, Redhwan M. A. [1 ,2 ]
Anbar, Mohammed [2 ]
Manickam, Selvakumar [2 ]
机构
[1] Ibb Univ, Fac Engn & Architecture, Ibb, Yemen
[2] USM, Natl Adv Ctr NAv6 IPv6, George Town, Malaysia
来源
NEURAL COMPUTING & APPLICATIONS | 2018年 / 30卷 / 12期
关键词
Network security; IPv6; security; Rule-based detection; ICMPv6 anomalous behaviour; Threshold techniques; INTRUSION DETECTION;
D O I
10.1007/s00521-017-2967-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rapid growth of the Internet in the past few years has revealed the limitation of address space in the current Internet Protocol (IP), namely IPv4. Essentially, the increasing demand and consumption of IP addresses have led to the anticipated exhaustion of IPv4 addresses. In order to address this concern, the Internet Protocol version 6 (IPv6) has been developed to provide a sufficient address space. IPv6 is shipped with a new protocol, namely, the neighbour discovery protocol (NDP) which has vulnerabilities that can be used by attackers to launch attacks on IPv6 networks. Such vulnerabilities include the lack of exchange message authentication of NDP. Attacks targeting ICMPv6 protocol display ICMPv6 anomalies. As such, this paper proposes a rule-based technique for detecting ICMPv6 anomalous behaviours that negatively affect the network performance. The effectiveness of this technique is demonstrated by using substantial datasets obtained from the National Advance IPv6 Centre of Excellence (NAv6) laboratory. The experimental results have proved that the proposed technique is capable of detecting ICMPv6 anomalous behaviour s with a detection accuracy rate of 92%.
引用
收藏
页码:3815 / 3824
页数:10
相关论文
共 50 条
  • [21] Rule-based detection of intrathoracic airway trees
    Sonka, M
    Park, WY
    Hoffman, EA
    IEEE TRANSACTIONS ON MEDICAL IMAGING, 1996, 15 (03) : 314 - 326
  • [22] Rule-based soft computing for edge detection
    Byoungjo Choi
    Seokhoon Kang
    Kyungkoo Jun
    Joonghwee Cho
    Multimedia Tools and Applications, 2017, 76 : 24819 - 24831
  • [23] Rule-based soft computing for edge detection
    Choi, Byoungjo
    Kang, Seokhoon
    Jun, Kyungkoo
    Cho, Joonghwee
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (23) : 24819 - 24831
  • [24] New rule-based phishing detection method
    Moghimi, Mahmood
    Varjani, Ali Yazdian
    EXPERT SYSTEMS WITH APPLICATIONS, 2016, 53 : 231 - 242
  • [25] Rule-based system for vulnerability detection of software
    Cho, Sung-Hoon
    Jang, Chang-Bok
    Lee, Moo-Hun
    Choi, Eui-In
    Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1630 - 1633
  • [26] DNS rule-based schema to botnet detection
    Alieyan, Kamal
    Almomani, Ammar
    Anbar, Mohammed
    Alauthman, Mohammad
    Abdullah, Rosni
    Gupta, B. B.
    ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (04) : 545 - 564
  • [27] Intrusion Detection Systems of ICMPv6-based DDoS attacks
    Omar E. Elejla
    Bahari Belaton
    Mohammed Anbar
    Ahmad Alnajjar
    Neural Computing and Applications, 2018, 30 : 45 - 56
  • [28] A new rule-based clustering technique for defect analysis
    Shankar, NG
    Zhong, ZW
    MICROELECTRONICS JOURNAL, 2005, 36 (08) : 718 - 724
  • [29] A rule-based component customization technique for QoS properties
    Zhou, J
    Cooper, K
    Yen, IL
    EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, PROCEEDINGS, 2004, : 302 - 303
  • [30] A rule-based paging technique for cellular wireless networks
    Maitra, N
    Saha, D
    Esakkiappan, C
    Bhattacharjee, PS
    Mukherjee, A
    2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 4290 - 4294