首页> 外文期刊>Quality Control, Transactions >Match-Prevention Technique Against Denial-of-Service Attack on Address Resolution and Duplicate Address Detection Processes in IPv6 Link-Local Network
【24h】

Match-Prevention Technique Against Denial-of-Service Attack on Address Resolution and Duplicate Address Detection Processes in IPv6 Link-Local Network

机译:匹配预防技术免受拒绝服务攻击的关于地址解析和重复地址检测过程IPv6链路本地网络

获取原文
获取原文并翻译 | 示例
       

摘要

Address Resolution (AR) and Duplicate Address Detection (DAD) are considered the most important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from each Internet Protocol version 6 (IPv6) host communicating with other neighbouring hosts. Two NDP messages are used during AR and DAD to communicate with one another in the same IPv6 link-local network, namely Neighbour Solicitation (NS) and Neighbour Advertisement (NA) messages. However, NDP messages have non-secure designs and lack verification mechanisms for authenticating whether incoming messages originate from a legitimate or illegitimate node. Therefore, any node in the same link can manipulate NS or NA messages and then launch a Denial-of-Service (DoS) attack. Techniques proposed to secure AR and DAD include Secure NDP (SeND) and Trust-NDP (Trust-ND); however, these techniques either entail high processing time and bandwidth consumption or are vulnerable to DoS attacks because of their designs. Therefore, to secure AR and DAD, this study aims to introduce a prevention technique called Match-Prevention, which secures target IP addresses and exchange messages (i.e. NS and NA). The processing time, bandwidth consumption and DoS prevention success rate of Match-Prevention in different scenarios are evaluated, and its performance is compared with those of existing techniques, including Standard-Process (i.e., Standard-AR and Standard-DAD), SeND and Trust-ND. Results show that Match-Prevention requires less processing time during AR and DAD processes and less bandwidth consumption compared with other existing techniques. In terms of DoS prevention success rate, the experiments show that Standard-Process and Trust-ND are unable to secure AR and DAD from DoS attacks, whilst SeND is vulnerable to flooding attacks. By contrast, Match-Prevention allows IPv6 nodes to verify the incoming message, discard the fake message before further processing and prevent a DoS attack during AR and DAD in an IPv6 link-local network.
机译:地址分辨率(AR)和重复地址检测(爸爸)被认为是邻居发现协议(NDP)中最重要的过程,其经常发生与其他相邻主机通信的每个因特网协议版本6(IPv6)主机发生。在AR期间使用两个NDP消息,并且爸爸在相同的IPv6链路 - 本地网络中彼此通信,即邻居征集(NS)和邻居广告(NA)消息。然而,NDP消息具有非安全设计,并且缺少验证机制,用于验证是否来自合法或非法节点的传入消息。因此,同一链路中的任何节点都可以操纵NS或NA消息,然后启动拒绝服务(DOS)攻击。建议保护AR和DAD的技术包括安全NDP(发送)和信任NDP(TRUST-ND);然而,这些技术要么需要高处理时间和带宽消耗,或者由于其设计而容易受到DOS攻击。因此,为了保护AR和爸爸,本研究旨在引入一种名为匹配预防的预防技术,该技术可保护目标IP地址和交换消息(即NS和NA)。评估了不同场景中匹配预防的处理时间,带宽消耗和DOS预防成功率,并将其性能与现有技术进行比较,包括标准过程(即标准-AR和标准爸),发送和信托 - ND。结果表明,与其他现有技术相比,匹配在AR和爸爸工艺中的处理时间较少,以及较少的带宽消耗。在DOS预防成功率方面,实验表明,标准过程和信任ND无法保护AR和爸爸从DOS攻击,虽然发送易受洪水攻击。相比之下,匹配预防允许IPv6节点验证传入消息,在进一步处理之前丢弃假消息,并在IPv6链路本地网络中防止在AR和DAD期间进行DOS攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号