Rule-based detection technique for ICMPv6 anomalous behaviour

被引:0
|
作者
Redhwan M. A. Saad
Mohammed Anbar
Selvakumar Manickam
机构
[1] Ibb University,Faculty of Engineering and Architecture
[2] Universiti Sains Malaysia (USM),National Advanced IPv6 Centre (NAv6)
来源
关键词
Network security; IPv6 security; Rule-based detection; ICMPv6 anomalous behaviour; Threshold techniques;
D O I
暂无
中图分类号
学科分类号
摘要
The rapid growth of the Internet in the past few years has revealed the limitation of address space in the current Internet Protocol (IP), namely IPv4. Essentially, the increasing demand and consumption of IP addresses have led to the anticipated exhaustion of IPv4 addresses. In order to address this concern, the Internet Protocol version 6 (IPv6) has been developed to provide a sufficient address space. IPv6 is shipped with a new protocol, namely, the neighbour discovery protocol (NDP) which has vulnerabilities that can be used by attackers to launch attacks on IPv6 networks. Such vulnerabilities include the lack of exchange message authentication of NDP. Attacks targeting ICMPv6 protocol display ICMPv6 anomalies. As such, this paper proposes a rule-based technique for detecting ICMPv6 anomalous behaviours that negatively affect the network performance. The effectiveness of this technique is demonstrated by using substantial datasets obtained from the National Advance IPv6 Centre of Excellence (NAv6) laboratory. The experimental results have proved that the proposed technique is capable of detecting ICMPv6 anomalous behaviour s with a detection accuracy rate of 92%.
引用
下载
收藏
页码:3815 / 3824
页数:9
相关论文
共 50 条
  • [1] Rule-based detection technique for ICMPv6 anomalous behaviour
    Saad, Redhwan M. A.
    Anbar, Mohammed
    Manickam, Selvakumar
    NEURAL COMPUTING & APPLICATIONS, 2018, 30 (12): : 3815 - 3824
  • [2] Brief of Intrusion Detection Systems in Detecting ICMPv6 Attacks
    Bdair, Adnan Hasan
    Abdullah, Rosni
    Manickam, Selvakumar
    Al-Ani, Ahmed K.
    COMPUTATIONAL SCIENCE AND TECHNOLOGY (ICCST 2019), 2020, 603 : 199 - 213
  • [3] Ada-IDS: AdaBoost Intrusion Detection System for ICMPv6 based Attacks in Internet of Things
    Anitha, A. Arul
    Arockiam, L.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (11) : 499 - 506
  • [4] Design of Heterogeneous Data Exchange Technology for Teaching Resources Based on ICMPv6
    Fang, Wei
    INTERNATIONAL JOURNAL OF EMERGING TECHNOLOGIES IN LEARNING, 2018, 13 (11) : 78 - 88
  • [5] Extracted rule-based technique for anomaly detection in a global network
    Azeez, Nureni A.
    Victor, Ogunlusi E.
    Misra, Sanjay
    Damasevicius, Robertas
    Maskeliunas, Rytis
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2022, 14 (06) : 616 - 637
  • [6] Hot News Detection System Using Rule-Based Technique
    Baby, Sahaya John S.
    Kalaiselvi, R.
    MATERIALS TODAY-PROCEEDINGS, 2020, 24 : 2330 - 2338
  • [7] Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks
    Elejla, Omar E.
    Anbar, Mohammed
    Hamouda, Shady
    Faisal, Serri
    Bahashwan, Abdullah Ahmed
    Hasbullah, Iznan H.
    APPLIED SCIENCES-BASEL, 2022, 12 (12):
  • [8] Rule-Based Detection of Anomalous Patterns in Device Behavior for Explainable IoT Security
    Costa, Gianni
    Forestiero, Agostino
    Ortale, Riccardo
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 4514 - 4525
  • [9] A Rule-Based Behaviour Planner for Autonomous Driving
    Bouchard, Frederic
    Sedwards, Sean
    Czarnecki, Krzysztof
    RULES AND REASONING, RULEML+RR 2022, 2022, 13752 : 263 - 279
  • [10] Labelled Dataset on Distributed Denial-of-Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6)
    Manickam, Selvakumar
    AIghuraibawi, Adnan Hasan Bdair
    Abdullah, Rosni
    Alyasseri, Zaid Abdi Alkareem
    Abdulkareem, Karrar Hameed
    Mohammed, Mazin Abed
    Alani, Ayman
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022