Inicio  /  Computers  /  Vol: 12 Par: 6 (2023)  /  Artículo
ARTÍCULO
TITULO

An Analysis of Neighbor Discovery Protocol Attacks

Firas Najjar    
Qusay Bsoul and Hasan Al-Refai    

Resumen

Neighbor Discovery Protocol (NDP) is a network protocol used in IPv6 networks to manage communication between neighboring devices. NDP is responsible for mapping IPv6 addresses to MAC addresses and discovering the availability of neighboring devices on the network. The main risk of deploying NDP on public networks is the potential for hackers or attackers to launch various types of attacks, such as address spoofing attacks, denial-of-service attacks, and man-in-the-middle attacks. Although Secure Neighbor Discovery (SEND) is implemented to secure NDP, its complexity and cost hinder its widespread deployment. This research emphasizes the potential hazard of deploying IPv6 networks in public spaces, such as airports, without protecting NDP messages. These risks have the potential to crash the entire local network. To demonstrate these risks, the GNS3 testbed environment is used to generate NDP attacks and capture the resulting packets using Wireshark for analysis. The analysis results reveal that with just a few commands, attackers can execute various NDP attacks. This highlights the need to protect against the potential issues that come with deploying IPv6 on widely accessible public networks. In addition, the analysis result shows that NDP attacks have behavior that can be used to define various NDP attacks.

Palabras claves

 Artículos similares

       
 
Abu Shad Ahammed, Aniebiet Micheal Ezekiel and Roman Obermaisser    
During an emergency rescue operation, rescuers have to deal with many different health complications like cardiovascular, respiratory, neurological, psychiatric, etc. The identification process of the common health complications in rescue events is not v... ver más
Revista: Algorithms

 
Mengran Zhou, Xiaokang Yao, Ziwei Zhu and Feng Hu    
A prerequisite for refined load management, crucial for intelligent energy management, is the precise classification of electric loads. However, the high dimensionality of electric load samples and poor identification accuracy of industrial scenarios mak... ver más
Revista: Applied Sciences

 
Youngki Park and Youhyun Shin    
This paper presents a novel approach for finding the most semantically similar conversational sentences in Korean and English. Our method involves training separate embedding models for each language and using a hybrid algorithm that selects the appropri... ver más
Revista: Applied Sciences

 
Bardia Rafieian, Pedro Hermosilla and Pere-Pau Vázquez    
In data science and visualization, dimensionality reduction techniques have been extensively employed for exploring large datasets. These techniques involve the transformation of high-dimensional data into reduced versions, typically in 2D, with the aim ... ver más
Revista: Applied Sciences

 
Subhan Ullah, Zahid Mahmood, Nabeel Ali, Tahir Ahmad and Attaullah Buriro    
The exponential growth of the Internet of Things (IoT) has led to the rapid expansion of interconnected systems, which has also increased the vulnerability of IoT devices to security threats such as distributed denial-of-service (DDoS) attacks. In this p... ver más
Revista: Computers