Rule-based detection technique for ICMPv6 anomalous behaviour

被引:7
|
作者
Saad, Redhwan M. A. [1 ,2 ]
Anbar, Mohammed [2 ]
Manickam, Selvakumar [2 ]
机构
[1] Ibb Univ, Fac Engn & Architecture, Ibb, Yemen
[2] USM, Natl Adv Ctr NAv6 IPv6, George Town, Malaysia
来源
NEURAL COMPUTING & APPLICATIONS | 2018年 / 30卷 / 12期
关键词
Network security; IPv6; security; Rule-based detection; ICMPv6 anomalous behaviour; Threshold techniques; INTRUSION DETECTION;
D O I
10.1007/s00521-017-2967-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rapid growth of the Internet in the past few years has revealed the limitation of address space in the current Internet Protocol (IP), namely IPv4. Essentially, the increasing demand and consumption of IP addresses have led to the anticipated exhaustion of IPv4 addresses. In order to address this concern, the Internet Protocol version 6 (IPv6) has been developed to provide a sufficient address space. IPv6 is shipped with a new protocol, namely, the neighbour discovery protocol (NDP) which has vulnerabilities that can be used by attackers to launch attacks on IPv6 networks. Such vulnerabilities include the lack of exchange message authentication of NDP. Attacks targeting ICMPv6 protocol display ICMPv6 anomalies. As such, this paper proposes a rule-based technique for detecting ICMPv6 anomalous behaviours that negatively affect the network performance. The effectiveness of this technique is demonstrated by using substantial datasets obtained from the National Advance IPv6 Centre of Excellence (NAv6) laboratory. The experimental results have proved that the proposed technique is capable of detecting ICMPv6 anomalous behaviour s with a detection accuracy rate of 92%.
引用
下载
收藏
页码:3815 / 3824
页数:10
相关论文
共 50 条
  • [31] Flow-Based IDS for ICMPv6-Based DDoS Attacks Detection
    Omar E. Elejla
    Mohammed Anbar
    Bahari Belaton
    Basem O. Alijla
    Arabian Journal for Science and Engineering, 2018, 43 : 7757 - 7775
  • [32] Flow-Based IDS for ICMPv6-Based DDoS Attacks Detection
    Elejla, Omar E.
    Anbar, Mohammed
    Belaton, Bahari
    Alijla, Basem O.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 7757 - 7775
  • [33] Rule-Based Analysis of Behaviour Learned by Evolutionary and Reinforcement Algorithms
    Slusny, Stanislav
    Neruda, Roman
    Vidnerova, Petra
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, PROCEEDINGS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2008, 5227 : 284 - 291
  • [34] Robotic Improvisers: Rule-Based Improvisation and Emergent Behaviour in HRI
    Troughton, Irene Alcubilla
    Baraka, Kim
    Hindriks, Koen
    Bleeker, Maaike
    PROCEEDINGS OF THE 2022 17TH ACM/IEEE INTERNATIONAL CONFERENCE ON HUMAN-ROBOT INTERACTION (HRI '22), 2022, : 561 - 569
  • [35] GDM-PREP: A Rule-Based Technique to Enhance Early Detection of Gestational Diabetes Mellitus
    Azmi, Ayunnie
    Zainuddin, Nurulhuda
    Aminordin, Azmi
    Mohamad, Masurah
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (07) : 783 - 790
  • [36] Comparison of Classification Algorithms on ICMPv6-Based DDoS Attacks Detection
    Elejla, Omar E.
    Belaton, Bahari
    Anbar, Mohammed
    Alabsi, Basim
    Al-Ani, Ahmed K.
    COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 347 - 357
  • [37] Rule-based space characterization for rumour detection in health
    Sicilia, Rosa
    Merone, Mario
    Valenti, Roberto
    Soda, Paolo
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2021, 105
  • [38] Rule-based noise detection for software measurement data
    Khoshgoftaar, TM
    Seliya, N
    Gao, K
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 302 - 307
  • [39] A relational rule-based system for PDF malware detection
    Salame, Geet C.
    Shinde, Nirlepa T.
    Baad, Prajakta P.
    Kshirsagar, Deepak D.
    Tanwar, Surendra Singh
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2024, 45 (04): : 925 - 934
  • [40] Building agents for rule-based intrusion detection system
    Jha, S
    Hassan, M
    COMPUTER COMMUNICATIONS, 2002, 25 (15) : 1366 - 1373