Machine Learning and Data Mining for IPv6 Network Defence

被引:0
|
作者
Weisman, Michael [1 ]
Ritchey, P. [1 ]
Shearer, G. [1 ]
Colbert, E. [1 ]
Dauber, E. [2 ]
Knachel, L. [1 ]
Sullivan, D. [1 ]
Parker, T. [1 ]
Greenstadt, R. [2 ]
机构
[1] US Army Res Lab, Adelphi, MD 20783 USA
[2] Drexel Univ, Philadelphia, PA 19104 USA
来源
PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018) | 2018年
关键词
data mining; machine learning; IPv6; Internet of Things;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In future battles, the warfighter will of necessity require more and more networked devices to perform a broad range of tasks. It has been predicted that by the year 2020, there will be 20 billion Internet-of-Things (IoT) devices (and more than 6.2 billion today) (N. Dragoni, 2017). IPv4 addresses are 32 bit and IPv6 addresses are 128 bit. All of the 232 approximate to 4.3 billion IPv4 addresses have already been exhausted, and except for the possible transfer from one device to another, and with the end-to-end design paradigm of IPv6, all new IoT devices will need an IPv6 address. Because of the huge number of potential IPv6 addresses (2128 approximate to 3.4 x1038), probing every address is not possible. The only way determine IPv6 addresses is by watching traffic. In this paper, we will apply data mining and machine learning techniques to better understand the challenges of IPv6 security. We perform semi-supervised learning techniques such as augmenting k-means clustering with sparse labels to understand the distribution of IPv4 addresses, and explore whether or not clustering of IPv6 addresses is possible. We also will measure the performance of IPv4 anomaly detection algorithms and look to apply these algorithms with modifications to IPv6 data. Finally, we explore domain adaptation and transfer learning from IPv4 to IPv6 and ask how easily can we adapt a system trained for IPv4 to IPv6 and what changes do we need to make? If we include additional IPv6 training data, how do things change?
引用
收藏
页码:681 / 688
页数:8
相关论文
共 50 条
  • [1] IPv6Landmarker: Enhancing IPv6 Street-Level Geolocation Through Network Landmark Mining and Targeted Updates
    Cheng, Ruosi
    Ding, Shichang
    Zhang, Liancheng
    Li, Ruixiang
    Du, Shaoyong
    Luo, Xiangyang
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2025, 12 (02): : 1280 - 1296
  • [2] IPv6 Based Routing in Building Automation Network
    Parsaei, Mohammad Reza
    Parnian, Ahmad Reza
    2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 1025 - 1031
  • [3] Leveraging Machine Learning for Enhanced Cyber Attack Detection and Defence in Big Data Management and Process Mining
    Gongada, Taviti Naidu
    Agnihotri, Amit
    Santosh, Kathari
    Ponnuswamy, Vijayalakshmi
    Narendran, S.
    Sharma, Tripti
    El-Ebiary, Yousef A. Baker
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (02) : 629 - 638
  • [4] Machine learning and data mining in manufacturing
    Dogan, Alican
    Birant, Derya
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 166
  • [5] DATA MINING AND MACHINE LEARNING IN ASTRONOMY
    Ball, Nicholas M.
    Brunner, Robert J.
    INTERNATIONAL JOURNAL OF MODERN PHYSICS D, 2010, 19 (07): : 1049 - 1106
  • [6] Diverse Analysis of Data Mining and Machine Learning Algorithms to Secure Computer Network
    Kumar, Neeraj
    Kumar, Upendra
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (02) : 1033 - 1059
  • [7] Diverse Analysis of Data Mining and Machine Learning Algorithms to Secure Computer Network
    Neeraj Kumar
    Upendra Kumar
    Wireless Personal Communications, 2022, 124 : 1033 - 1059
  • [8] A Managed IPv6 Transitioning Architecture for Large Network Deployments
    Mackay, Michael
    Edwards, Christopher
    IEEE INTERNET COMPUTING, 2009, 13 (04) : 42 - 51
  • [9] IPv6 DoS Attacks Detection Using Machine Learning Enhanced IDS in SDN/NFV Environment
    Tseng, Chia-Wei
    Wu, Li-Fan
    Hsu, Shih-Chun
    Yu, Sheng-Wang
    APNOMS 2020: 2020 21ST ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2020, : 263 - 266
  • [10] Desktop and mobile operating system fingerprinting based on IPv6 protocol using machine learning algorithms
    Salah S.
    Abu Alhawa M.
    Zaghal R.
    International Journal of Security and Networks, 2022, 17 (01): : 1 - 12