An Analysis of Neighbor Discovery Protocol Attacks

نویسندگان

چکیده

Neighbor Discovery Protocol (NDP) is a network protocol used in IPv6 networks to manage communication between neighboring devices. NDP responsible for mapping addresses MAC and discovering the availability of devices on network. The main risk deploying public potential hackers or attackers launch various types attacks, such as address spoofing denial-of-service man-in-the-middle attacks. Although Secure (SEND) implemented secure NDP, its complexity cost hinder widespread deployment. This research emphasizes hazard spaces, airports, without protecting messages. These risks have crash entire local To demonstrate these risks, GNS3 testbed environment generate attacks capture resulting packets using Wireshark analysis. analysis results reveal that with just few commands, can execute highlights need protect against issues come widely accessible networks. In addition, result shows behavior be define

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor Discovery Protocol

This paper describes the implementation and use of a preprocessor module for the open source Intrusion Detection System Snort. Our implementation utilizes preprocessor APIs for the extension of Snort and provides several new IPv6-specific rule options that make the definition of IPv6-specific attack signatures possible. The preprocessor detects attacks against the IPv6 Neighbor Discovery Protoc...

متن کامل

an infinite planar array of rectangular microstrip patch antenna analysis

the methods which are used to analyze microstrip antennas, are divited into three categories: empirical methods, semi-empirical methods and full-wave analysis. empirical and semi-empirical methods are generally based on some fundamental simplifying assumptions about quality of surface current distribution and substrate thickness. thses simplificatioms cause low accuracy in field evaluation. ful...

15 صفحه اول

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

OR-based Block Combination for Asynchronous Asymmetric Neighbor Discovery Protocol

The neighbor discovery protocol (NDP) is one of the critical research subjects in wireless sensor networks (WSNs) for efficient energy management of sensor nodes. A block design concept can be applied to find a neighbor discovery schedule that guarantees at least one common active slot between any pair of sensor nodes. However, the block design-based solutions in literature are not flexible eno...

متن کامل

SearchLight: A Systematic Probing-based Asynchronous Neighbor Discovery Protocol

The rapid deployment of millions of smart phones has resulted in a demand for proximity-based social networking applications. However, the usefulness of these applications is limited by the lack of effective and energy efficient neighbor discovery protocols. While probabilistic approaches perform well for the average case, they exhibit long tails resulting in high upper bounds on neighbor disco...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers

سال: 2023

ISSN: ['2073-431X']

DOI: https://doi.org/10.3390/computers12060125