[go: up one dir, main page]

Ageel et al., 2024 - Google Patents

SURVEY: SECURING IPV6 NEIGHBOR DISCOVERY PROTOCOL

Ageel et al., 2024

View PDF
Document ID
3889257590545998639
Author
Ageel M
Abdulmoghni Y
Al-Ashmoery Y
et al.
Publication year
Publication venue
Al-Razi University Journal of Computer Science and Technology

External Links

Snippet

IPv6 Neighbor Discovery Protocol (NDP) is essential to facilitate communication between local network nodes. However, NDP is vulnerable to various attacks that can disrupt network communication and facilitate malicious activities. This study attempts to identify the major …
Continue reading at rujms.alraziuni.edu.ye (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

Publication Publication Date Title
Dayal et al. Research trends in security and DDoS in SDN
US9088581B2 (en) Methods and apparatus for authenticating an assertion of a source
Cheema et al. [Retracted] Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review
Mohammadi et al. Slicots: An sdn-based lightweight countermeasure for tcp syn flooding attacks
Masdari et al. A survey and taxonomy of DoS attacks in cloud computing
US11245721B2 (en) Using a blockchain for distributed denial of service attack mitigation
Abliz Internet denial of service attacks and defense mechanisms
Rajkumar A survey on latest DoS attacks: classification and defense mechanisms
Mohammadi et al. SYN‐Guard: An effective counter for SYN flooding attack in software‐defined networking
Kavisankar et al. A mitigation model for TCP SYN flooding with IP spoofing
Haddadi et al. DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment
Nasser et al. Provably curb man-in-the-middle attack-based ARP spoofing in a local network
Soni et al. A L-IDS against dropping attack to secure and improve RPL performance in WSN aided IoT
Al-Ani et al. Detection and defense mechanisms on duplicate address detection process in IPv6 link-local network: A survey on limitations and requirements
Lu et al. An SDN‐based authentication mechanism for securing neighbor discovery protocol in IPv6
Jeyanthi et al. Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment
Boppana et al. Analyzing the vulnerabilities introduced by ddos mitigation techniques for software-defined networks
Al-Ani et al. NDPsec: Neighbor discovery protocol security mechanism
Wong et al. Network infrastructure security
Ahmed et al. Improving security for IPv6 neighbor discovery
De Donno et al. A taxonomy of distributed denial of service attacks
Fowler et al. Impact of denial of service solutions on network quality of service
Devi et al. Cloud-based DDoS attack detection and defence system using statistical approach
Pareek et al. Different type network security threats and solutions, a review
Ageel et al. SURVEY: SECURING IPV6 NEIGHBOR DISCOVERY PROTOCOL