{"title":"基于NDP协议的MITM攻击Petri网模型","authors":"Liumei Zhang, Yu Han, Yichuan Wang, Ruiqin Quan","doi":"10.1109/NaNA56854.2022.00074","DOIUrl":null,"url":null,"abstract":"Neighbor Discovery Protocol (NDP) is one of the core protocols of IPv6 networks. Since NDP messages are an unauthenticated stateless protocol, they are vulnerable to various types of attacks, and Man-In-The-Middle (MITM) attacks are one of the most well-known attacks in the computer field. During NDP address resolution, attackers change their own IP-MAC mapping relationships by sniffing NA (Neighbor Advertisement) messages, thus spoofing the source host's neighbor cache table and compromising the confidentiality, integrity and availability of the IPv6 network. Therefore, this paper focuses on the MITM attack in the NDP address resolution process, and performs a fine-grained analysis and Petri Net modelling of the attack process.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Petri Net Model of MITM Attack Based on NDP Protocol\",\"authors\":\"Liumei Zhang, Yu Han, Yichuan Wang, Ruiqin Quan\",\"doi\":\"10.1109/NaNA56854.2022.00074\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Neighbor Discovery Protocol (NDP) is one of the core protocols of IPv6 networks. Since NDP messages are an unauthenticated stateless protocol, they are vulnerable to various types of attacks, and Man-In-The-Middle (MITM) attacks are one of the most well-known attacks in the computer field. During NDP address resolution, attackers change their own IP-MAC mapping relationships by sniffing NA (Neighbor Advertisement) messages, thus spoofing the source host's neighbor cache table and compromising the confidentiality, integrity and availability of the IPv6 network. Therefore, this paper focuses on the MITM attack in the NDP address resolution process, and performs a fine-grained analysis and Petri Net modelling of the attack process.\",\"PeriodicalId\":113743,\"journal\":{\"name\":\"2022 International Conference on Networking and Network Applications (NaNA)\",\"volume\":\"165 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Networking and Network Applications (NaNA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NaNA56854.2022.00074\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Networking and Network Applications (NaNA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NaNA56854.2022.00074","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Petri Net Model of MITM Attack Based on NDP Protocol
Neighbor Discovery Protocol (NDP) is one of the core protocols of IPv6 networks. Since NDP messages are an unauthenticated stateless protocol, they are vulnerable to various types of attacks, and Man-In-The-Middle (MITM) attacks are one of the most well-known attacks in the computer field. During NDP address resolution, attackers change their own IP-MAC mapping relationships by sniffing NA (Neighbor Advertisement) messages, thus spoofing the source host's neighbor cache table and compromising the confidentiality, integrity and availability of the IPv6 network. Therefore, this paper focuses on the MITM attack in the NDP address resolution process, and performs a fine-grained analysis and Petri Net modelling of the attack process.