Neighbor discovery protocol anomaly-based detection system using neural network algorithm

被引:0
作者
Saad, Redhwan M. A. [1 ,2 ]
Anbar, Mohammed [2 ]
Manickam, Selvakumar [2 ]
Shaheen, Samir I. [3 ]
Hasbullah, Iznan H. [2 ]
机构
[1] Ibb Univ, Fac Engn, Dept Elect Engn, Ibb 70270, Yemen
[2] Univ Sains Malaysia USM, Natl Adv Ctr IPv6, Gelugor, Penang, Malaysia
[3] Cairo Univ, Fac Engn, Dept Comp Engn, Giza 12613, Egypt
关键词
NDP; Anomaly detection; Neural networks; Backpropagation algorithm; Feature selection; IPv6; network; ATTACKS;
D O I
10.1007/s10207-024-00815-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential increase in Internet-facing devices in the last decade has resulted in IP address exhaustion due to the limitations of the existing IPv4 address space. Therefore, the Internet Engineering Task Force engineered a new version of the Internet protocol known as Internet Protocol Version 6 (IPv6) to resolve the issue. However, IPv6 is highly dependent on the neighbor discovery protocol (NDP), which, unfortunately, has well-known vulnerabilities in its underlying messaging protocol, the Internet Control Message Protocol version 6. So, the NDP flaws leave the IPv6 network open to many security threats and attacks, including man-in-the-middle, spoofing, and denial-of-service attacks, which are the most annoying attack at the network layer. Unfortunately, one of the critical issues plaguing the existing anomaly-based detection system is the effectiveness of detecting NDP-based DDoS attacks, which requires urgent attention. This paper suggests a system to find network traffic patterns that are not normal that are caused by NDP-based attacks. It does this by teaching neural networks how to recognize network attack patterns using the backpropagation algorithm. The proposed system is a big step forward from where the field is now because it uses a complex neural network algorithm to create an NDP anomaly-based detection system. Using a real dataset to test the proposed system's performance shows that it can find NDP anomalies with a 99.95% success rate, a 99.92% precision rate, a 99.98% recall rate, an F1-Score of 99.98%, and a 0.040% false positive rate. Also, the proposed approach shows better results compared to other existing approaches.
引用
收藏
页码:1787 / 1803
页数:17
相关论文
共 50 条
[21]   Anomaly-based Intrusion Detection System for smart lighting [J].
Lara, Agustin ;
Estepa, Antonio ;
Estepa, Rafael ;
Diaz-Verdejo, Jesus E. ;
Mayor, Vicente .
INTERNET OF THINGS, 2024, 28
[22]   Anomaly-based intrusion detection system for IoT application [J].
Bhavsar M. ;
Roy K. ;
Kelly J. ;
Olusola O. .
Discover Internet of Things, 2023, 3 (01)
[23]   Anomaly-based network intrusion detection: Techniques, systems and challenges [J].
Garcia-Teodoro, P. ;
Diaz-Verdejo, J. ;
Macia-Fernandez, G. ;
Vazquez, E. .
COMPUTERS & SECURITY, 2009, 28 (1-2) :18-28
[24]   Incremental Anomaly-based Intrusion Detection System Using Limited Labeled Data [J].
Alaei, Parisa ;
Noorbehbahani, Fakhroddin .
2017 3RD INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2017, :178-184
[25]   A systematic literature review of methods and datasets for anomaly-based network intrusion detection [J].
Yang, Zhen ;
Liu, Xiaodong ;
Li, Tong ;
Wu, Di ;
Wang, Jinjiang ;
Zhao, Yunwei ;
Han, Han .
COMPUTERS & SECURITY, 2022, 116
[26]   Anomaly-Based Intrusion Detection From Network Flow Features Using Variational Autoencoder [J].
Zavrak, Sultan ;
Iskefiyeli, Murat .
IEEE ACCESS, 2020, 8 :108346-108358
[27]   Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection [J].
El Khairi, Asbat ;
Caselli, Marco ;
Knierim, Christian ;
Peter, Andreas ;
Continella, Andrea .
PROCEEDINGS OF THE 2022 CLOUD COMPUTING SECURITY WORKSHOP, CCSW 2022, 2022, :9-21
[28]   An Application of Membrane Computing to Anomaly-Based Intrusion Detection System [J].
Idowu, Rufai Kazeem ;
Maroosi, Ali ;
Muniyandi, Ravie Chandren ;
Othman, Zulaiha Ali .
4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI 2013), 2013, 11 :585-592
[29]   Anomaly-Based Risk Detection Using Digital News Articles [J].
Pointner, Andreas ;
Spitzer, Eva-Maria ;
Krauss, Oliver ;
Stoeckl, Andreas .
INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 1, 2023, 542 :1-16
[30]   Anomaly-based intrusion detection system in IoT using kernel extreme learning machine [J].
Bacha S. ;
Aljuhani A. ;
Abdellafou K.B. ;
Taouali O. ;
Liouane N. ;
Alazab M. .
Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (1) :231-242