Neighbor discovery protocol anomaly-based detection system using neural network algorithm

被引:0
作者
Saad, Redhwan M. A. [1 ,2 ]
Anbar, Mohammed [2 ]
Manickam, Selvakumar [2 ]
Shaheen, Samir I. [3 ]
Hasbullah, Iznan H. [2 ]
机构
[1] Ibb Univ, Fac Engn, Dept Elect Engn, Ibb 70270, Yemen
[2] Univ Sains Malaysia USM, Natl Adv Ctr IPv6, Gelugor, Penang, Malaysia
[3] Cairo Univ, Fac Engn, Dept Comp Engn, Giza 12613, Egypt
关键词
NDP; Anomaly detection; Neural networks; Backpropagation algorithm; Feature selection; IPv6; network; ATTACKS;
D O I
10.1007/s10207-024-00815-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential increase in Internet-facing devices in the last decade has resulted in IP address exhaustion due to the limitations of the existing IPv4 address space. Therefore, the Internet Engineering Task Force engineered a new version of the Internet protocol known as Internet Protocol Version 6 (IPv6) to resolve the issue. However, IPv6 is highly dependent on the neighbor discovery protocol (NDP), which, unfortunately, has well-known vulnerabilities in its underlying messaging protocol, the Internet Control Message Protocol version 6. So, the NDP flaws leave the IPv6 network open to many security threats and attacks, including man-in-the-middle, spoofing, and denial-of-service attacks, which are the most annoying attack at the network layer. Unfortunately, one of the critical issues plaguing the existing anomaly-based detection system is the effectiveness of detecting NDP-based DDoS attacks, which requires urgent attention. This paper suggests a system to find network traffic patterns that are not normal that are caused by NDP-based attacks. It does this by teaching neural networks how to recognize network attack patterns using the backpropagation algorithm. The proposed system is a big step forward from where the field is now because it uses a complex neural network algorithm to create an NDP anomaly-based detection system. Using a real dataset to test the proposed system's performance shows that it can find NDP anomalies with a 99.95% success rate, a 99.92% precision rate, a 99.98% recall rate, an F1-Score of 99.98%, and a 0.040% false positive rate. Also, the proposed approach shows better results compared to other existing approaches.
引用
收藏
页码:1787 / 1803
页数:17
相关论文
共 33 条
[11]  
Chen H.-H., 2009, ADV INFORM SECURITY, V5576
[12]  
Do Xuan C., 2021, Int. J. Electr. Comput. Eng. (2088-8708), V11, P2360
[13]   Flow-Based IDS for ICMPv6-Based DDoS Attacks Detection [J].
Elejla, Omar E. ;
Anbar, Mohammed ;
Belaton, Bahari ;
Alijla, Basem O. .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) :7757-7775
[14]  
Henderson T., 2017, RFC8046 IETF
[15]  
Jaiganesh V, 2013, 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), P232, DOI 10.1109/ICICES.2013.6508202
[16]  
Li Z., 2009, 2009 5 INT C NAT COM, DOI [10.1109/ICNC.2009.673, DOI 10.1109/ICNC.2009.673]
[17]  
Lifang Zi, 2010, Proceedings of the 2010 Fourth International Conference on Network and System Security (NSS 2010), P281, DOI 10.1109/NSS.2010.70
[18]  
NETSCOUT, 2023, DDOS THREAT INT REP, P16
[19]  
Nixon J Sebastian, 2022, International Journal, V2, P1
[20]   Security in smart home environment: issues, challenges, and countermeasures - a survey [J].
Saad R.M.A. ;
Al Soufy K.A.M. ;
Shaheen S.I. .
International Journal of Security and Networks, 2023, 18 (01) :1-9