Flow-Based IDS for ICMPv6-Based DDoS Attacks Detection

被引:25
作者
Elejla, Omar E. [1 ]
Anbar, Mohammed [2 ]
Belaton, Bahari [1 ]
Alijla, Basem O. [3 ]
机构
[1] Univ Sains Malaysia, Sch Comp Sci, Gelugor, Penang, Malaysia
[2] Univ Sains Malaysia, Natl Adv Ctr NAv6 IPv6, Gelugor, Penang, Malaysia
[3] Islamic Univ Gaza, Fac Informat Technol, Gaza, Palestine
关键词
Flow-based anomaly detection; ICMPv6; IPv6; networks; DoS; DDoS; Data mining-based IDS; Network flow; INTRUSION DETECTION SYSTEMS; ANOMALY DETECTION; NEURAL-NETWORK;
D O I
10.1007/s13369-018-3149-7
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The Internet Control Message Protocol version Six (ICMPv6) is categorized as the most important part of the Internet Protocol version Six (IPv6) due to its core functionalities. However, ICMPv6 protocol is vulnerable to different types of attacks such as Distributed Denial of Services (DDoS) attacks that are based on ICMPv6 messages. ICMPv6-based DDoS attacks are the most performed attacks against IPv6 networks and considered a grave problem of today Internet. Intrusion Detection Systems (IDSs) under different categories have been proposed to detect ICMPv6-based DDoS attacks. However, these IDSs are inefficient in detecting the attacks due to their limitations. The main limitation of the existing IDSs is the dependency on packet-based representation and features which are unsuitable for detecting DDoS attacks as experimentally proven. Therefore, this research proposes a new IDS, based on a flow-based representation of traffic, and a set of novel features for detecting the attacks. This is the first time a flow-based representation and features are proposed to detect ICMPv6-based DDoS attacks. Cross-validation and supplied set testing approaches have been applied to evaluate the proposed IDS using seven classifiers. The evaluation experiments were conducted based on real datasets and showed that the proposed flow-based IDS with the proposed novel features is efficient and reliable in detecting ICMPv6-based DDoS attacks with acceptable detection accuracies and false positive rates.
引用
收藏
页码:7757 / 7775
页数:19
相关论文
共 58 条
[1]  
Anbar Mohammed, 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST), P282, DOI 10.1109/PST.2016.7906975
[2]  
Anbar Mohammed, 2016, International Conference on Information Science and Applications (ICISA) 2016. LNEE 376, P603, DOI 10.1007/978-981-10-0557-2_59
[3]  
Anbar M, 2016, REV SECURITY VULNERA, P603, DOI DOI 10.1007/978-981-10-0557-259
[4]   Review of Preventive Security Mechanisms for Neighbour Discovery Protocol [J].
Anbar, Mohammed ;
Abdullah, Rosni ;
Saad, Redhwan M. A. ;
Hasbullah, Iznan H. .
ADVANCED SCIENCE LETTERS, 2017, 23 (11) :11306-11310
[5]   A Machine Learning Approach to Detect Router Advertisement Flooding Attacks in Next-Generation IPv6 Networks [J].
Anbar, Mohammed ;
Abdullah, Rosni ;
Al-Tamimi, Bassam Naji ;
Hussain, Amir .
COGNITIVE COMPUTATION, 2018, 10 (02) :201-214
[6]  
[Anonymous], 2009, SIGKDD Explorations, DOI DOI 10.1145/1656274.1656278
[7]  
[Anonymous], 2006, P 2 INT C SEM KNOWL
[8]  
[Anonymous], 2006, 4443 RFC
[9]  
[Anonymous], INTERNET PROTOCOL VE
[10]  
[Anonymous], THESIS