A Machine Learning Approach to Detect Router Advertisement Flooding Attacks in Next-Generation IPv6 Networks

作者: Mohammed Anbar , Rosni Abdullah , Bassam Naji Al-Tamimi , Amir Hussain

DOI: 10.1007/S12559-017-9519-8

关键词:

摘要: Router advertisement (RA) flooding attack aims to exhaust all node resources, such as CPU and memory, attached routers on the same link. A biologically inspired machine learning-based approach is proposed in this study detect RA attacks. The technique exploits information gain ratio (IGR) principal component analysis (PCA) for feature selection a support vector (SVM)-based predictor model, which can also input traffic anomaly. real benchmark dataset obtained from National Advanced IPv6 Center of Excellence laboratory used evaluate technique. evaluation process conducted with two experiments. first experiment investigates effect IGR PCA methods identify most contributed features SVM training model. second evaluates capability results show that demonstrates excellent detection accuracy thus an effective choice detecting main contribution identification set new are related by utilizing algorithms. paper effectively presence network.

参考文章(41)
M. Theimer, R. Finlayson, J. C. Mogul, T. Mann, Reverse Address Resolution Protocol RFC. ,vol. 903, pp. 1- 4 ,(1984)
Kanoksri Sarinnapakorn, Mei-Ling Shyu, Shu-Ching Chen, LiWu Chang, A Novel Anomaly Detection Scheme Based on Principal Component Classifier international conference on data mining. pp. 172- 179 ,(2003)
Shunjie Han, Cao Qubo, Han Meng, Parameter selection in SVM with RBF kernel function world automation congress. pp. 1- 4 ,(2012)
Vivek Ramachandran, Sukumar Nandi, Detecting ARP Spoofing: An Active Technique Information Systems Security. pp. 239- 250 ,(2005) , 10.1007/11593980_18
E. Nordmark, T. Narten, W. Simpson, Neighbor Discovery for IP Version 6 (IPv6) RFC, Vol. rfc2461. ,vol. 2461, pp. 1- 82 ,(1998)
Guisong Liu, Zhang Yi, Shangming Yang, Letters: A hierarchical intrusion detection model based on the PCA neural networks Neurocomputing. ,vol. 70, pp. 1561- 1568 ,(2007) , 10.1016/J.NEUCOM.2006.10.146
Carl Livadas, Robert Walsh, David Lapsley, W. Timothy Strayer, Usilng Machine Learning Technliques to Identify Botnet Traffic local computer networks. pp. 967- 974 ,(2006) , 10.1109/LCN.2006.322210
Ferdous A. Barbhuiya, Gunjan Bansal, Niteesh Kumar, Santosh Biswas, Sukumar Nandi, Detection of neighbor discovery protocol based attacks in IPv6 network Network Science. ,vol. 2, pp. 91- 113 ,(2013) , 10.1007/S13119-013-0018-2