{"title":"P4NSA: P4-based security protection technology for IPv6 neighbor solicitation and advertisement spoofing","authors":"Wenhao Xia , Liancheng Zhang , Yi Guo , Hongtao Zhang , Lanxin Cheng","doi":"10.1016/j.cose.2025.104400","DOIUrl":null,"url":null,"abstract":"<div><div>Neighbor solicitation and neighbor advertisement messages from neighbor discovery protocol are used for address resolution in IPv6 network. However, the NDP protocol lacks authentication mechanisms for exchanged messages, so hosts in a local area network are vulnerable to malicious threats during the address resolution process. Existing detection and protection solutions have high complexity, consume many resources, and have poor scalability and deployability. To this end, the SDN P4-based Neighbour Discovery Protocol security protection technology is proposed for the protection of NS and NA message processes by taking advantage of the open and programmable nature of P4 technology that can flexibly customize the threat detection and protection mechanisms. This technology collects the IPv6 addresses and corresponding switching ports of IPv6 hosts joining the network, and discards the spoofed packets that do not belong to the corresponding ports according to the spoofed packet filtering algorithm. Experimental results show that this technology can properly collect information about hosts joining IPv6 networks and filter and discard NS/NA spoofed messages sent by spoofing tools such as THC-IPv6 and IPv6 Toolkit. Compared with security protection technologies such as Match-Prevention and NDPsec, this technology does not add additional neighbour discovery protocol parameter options or use hash cryptography, so it is less complex, consumes fewer resources, and is more feasible in deployment and application.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"153 ","pages":"Article 104400"},"PeriodicalIF":4.8000,"publicationDate":"2025-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825000896","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Neighbor solicitation and neighbor advertisement messages from neighbor discovery protocol are used for address resolution in IPv6 network. However, the NDP protocol lacks authentication mechanisms for exchanged messages, so hosts in a local area network are vulnerable to malicious threats during the address resolution process. Existing detection and protection solutions have high complexity, consume many resources, and have poor scalability and deployability. To this end, the SDN P4-based Neighbour Discovery Protocol security protection technology is proposed for the protection of NS and NA message processes by taking advantage of the open and programmable nature of P4 technology that can flexibly customize the threat detection and protection mechanisms. This technology collects the IPv6 addresses and corresponding switching ports of IPv6 hosts joining the network, and discards the spoofed packets that do not belong to the corresponding ports according to the spoofed packet filtering algorithm. Experimental results show that this technology can properly collect information about hosts joining IPv6 networks and filter and discard NS/NA spoofed messages sent by spoofing tools such as THC-IPv6 and IPv6 Toolkit. Compared with security protection technologies such as Match-Prevention and NDPsec, this technology does not add additional neighbour discovery protocol parameter options or use hash cryptography, so it is less complex, consumes fewer resources, and is more feasible in deployment and application.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.