Omar E. Elejla, B. Belaton, Mohammed Anbar, Issa M. Smadi
{"title":"一组检测路由器通告泛洪攻击的新特征","authors":"Omar E. Elejla, B. Belaton, Mohammed Anbar, Issa M. Smadi","doi":"10.1109/PICICT.2017.19","DOIUrl":null,"url":null,"abstract":"ICMPv6 is vulnerable to a set of attacks that contributes to preventing IPv6 from being trusted for full implementations on today's networks. One of these attacks is Router Advertisement (RA) flooding attack by sending a huge traffic toward a victim to consume its resources and stop its services. To detect these attacks, classification processes are applied based on a set of features used to represent the network traffic. This paper proposes a set of representative features depends on a suitable formation of data using a flow representation of the traffic. The proposed features and representation have achieved an acceptable detection ability of the RA flooding attacks using several classification techniques. Moreover, the achieved detection ability might be further improved by extracting more representative features or selecting a subset of them to represent the traffic.","PeriodicalId":259869,"journal":{"name":"2017 Palestinian International Conference on Information and Communication Technology (PICICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"A New Set of Features for Detecting Router Advertisement Flooding Attacks\",\"authors\":\"Omar E. Elejla, B. Belaton, Mohammed Anbar, Issa M. Smadi\",\"doi\":\"10.1109/PICICT.2017.19\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ICMPv6 is vulnerable to a set of attacks that contributes to preventing IPv6 from being trusted for full implementations on today's networks. One of these attacks is Router Advertisement (RA) flooding attack by sending a huge traffic toward a victim to consume its resources and stop its services. To detect these attacks, classification processes are applied based on a set of features used to represent the network traffic. This paper proposes a set of representative features depends on a suitable formation of data using a flow representation of the traffic. The proposed features and representation have achieved an acceptable detection ability of the RA flooding attacks using several classification techniques. Moreover, the achieved detection ability might be further improved by extracting more representative features or selecting a subset of them to represent the traffic.\",\"PeriodicalId\":259869,\"journal\":{\"name\":\"2017 Palestinian International Conference on Information and Communication Technology (PICICT)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Palestinian International Conference on Information and Communication Technology (PICICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PICICT.2017.19\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Palestinian International Conference on Information and Communication Technology (PICICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICICT.2017.19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A New Set of Features for Detecting Router Advertisement Flooding Attacks
ICMPv6 is vulnerable to a set of attacks that contributes to preventing IPv6 from being trusted for full implementations on today's networks. One of these attacks is Router Advertisement (RA) flooding attack by sending a huge traffic toward a victim to consume its resources and stop its services. To detect these attacks, classification processes are applied based on a set of features used to represent the network traffic. This paper proposes a set of representative features depends on a suitable formation of data using a flow representation of the traffic. The proposed features and representation have achieved an acceptable detection ability of the RA flooding attacks using several classification techniques. Moreover, the achieved detection ability might be further improved by extracting more representative features or selecting a subset of them to represent the traffic.