1. Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)
- Author
-
Abdullah Ahmed Bahashwan, Ali Abdulqader Bin-Salem, Iznan H. Hasbullah, Mohammed Anbar, and Ziyad R. Alashhab
- Subjects
Routing protocol ,General Computer Science ,Computer science ,computer.internet_protocol ,entropy algorithm ,02 engineering and technology ,Intrusion detection systems (IDS) ,01 natural sciences ,RA~DoS flooding attack ,Neighbor Discovery Protocol ,law.invention ,NDP traffic abnormalities ,law ,Internet Protocol ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Network performance ,0101 mathematics ,Electrical and Electronic Engineering ,Stateless protocol ,Authentication ,business.industry ,010102 general mathematics ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,General Engineering ,NS~DoS flooding attack ,IPv6 ,Flooding (computer networking) ,network traffic representation ,020201 artificial intelligence & image processing ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,computer ,lcsh:TK1-9971 ,Computer network - Abstract
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it vulnerable to many types of attacks, such as Router Advertisement (RA) and Neighbour Solicitation (NS) DoS flooding attacks. In these types of attacks, attackers send an enormous volume of abnormal NDP traffic, which causes congestion that degrades network performance. The expected behavior among these attacks is the existence of NDP traffic abnormalities. Thus, this research aims to propose a flow-based approach to detect abnormal NDP traffic behavior, which is considered an indicator of the presence of NDP-based attacks, such as RA and NS DoS flooding attacks. Also, the proposed approach relies on flow-based network traffic representation and adoption of the Entropy algorithm to detect the randomness in the network traffic. The proposed approach is evaluated in terms of detection accuracy, precision, recall, and F1-Score using a simulated dataset. The experimental result shows that the proposed approach obtained 98.1%, 55%, 100%, and 70.96% for average accuracy, precision, recall, and F1-Score, respectively, in detecting abnormal NDP traffic behavior caused by the RA DoS flooding attack. Meanwhile, the proposed approach obtained 99%, 91.3%, 100%, and 95.45% for average accuracy, precision, recall, and F1-Score, respectively, in detecting the abnormal NDP traffic behavior caused by the NS DoS flooding attack. Also, the proposed approach shows better results compared to other existing approaches.
- Published
- 2021