Ageel et al., 2024 - Google Patents
SURVEY: SECURING IPV6 NEIGHBOR DISCOVERY PROTOCOLAgeel et al., 2024
View PDF- Document ID
- 3889257590545998639
- Author
- Ageel M
- Abdulmoghni Y
- Al-Ashmoery Y
- et al.
- Publication year
- Publication venue
- Al-Razi University Journal of Computer Science and Technology
External Links
Snippet
IPv6 Neighbor Discovery Protocol (NDP) is essential to facilitate communication between local network nodes. However, NDP is vulnerable to various attacks that can disrupt network communication and facilitate malicious activities. This study attempts to identify the major …
- 238000004891 communication 0 abstract description 33
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dayal et al. | Research trends in security and DDoS in SDN | |
US9088581B2 (en) | Methods and apparatus for authenticating an assertion of a source | |
Cheema et al. | [Retracted] Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review | |
Mohammadi et al. | Slicots: An sdn-based lightweight countermeasure for tcp syn flooding attacks | |
Masdari et al. | A survey and taxonomy of DoS attacks in cloud computing | |
US11245721B2 (en) | Using a blockchain for distributed denial of service attack mitigation | |
Abliz | Internet denial of service attacks and defense mechanisms | |
Rajkumar | A survey on latest DoS attacks: classification and defense mechanisms | |
Mohammadi et al. | SYN‐Guard: An effective counter for SYN flooding attack in software‐defined networking | |
Kavisankar et al. | A mitigation model for TCP SYN flooding with IP spoofing | |
Haddadi et al. | DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment | |
Nasser et al. | Provably curb man-in-the-middle attack-based ARP spoofing in a local network | |
Soni et al. | A L-IDS against dropping attack to secure and improve RPL performance in WSN aided IoT | |
Al-Ani et al. | Detection and defense mechanisms on duplicate address detection process in IPv6 link-local network: A survey on limitations and requirements | |
Lu et al. | An SDN‐based authentication mechanism for securing neighbor discovery protocol in IPv6 | |
Jeyanthi et al. | Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment | |
Boppana et al. | Analyzing the vulnerabilities introduced by ddos mitigation techniques for software-defined networks | |
Al-Ani et al. | NDPsec: Neighbor discovery protocol security mechanism | |
Wong et al. | Network infrastructure security | |
Ahmed et al. | Improving security for IPv6 neighbor discovery | |
De Donno et al. | A taxonomy of distributed denial of service attacks | |
Fowler et al. | Impact of denial of service solutions on network quality of service | |
Devi et al. | Cloud-based DDoS attack detection and defence system using statistical approach | |
Pareek et al. | Different type network security threats and solutions, a review | |
Ageel et al. | SURVEY: SECURING IPV6 NEIGHBOR DISCOVERY PROTOCOL |