Detecting neighbor discovery protocol-based flooding attack using machine learning techniques

12Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Neighbor Discovery Protocol (NDP) is stateless and lacks of authentication which exposes it to flooding attacks. Securing NDP is critical due to the large deployment of open network. Commonly existing solutions for securing NDP violate its design principle in terms of overhead and complexity. Other solutions suffer from high false positive alerts which affects solution trustiness. This paper aims to investigate the use of machine learning mechanism for detecting NDP flooding attacks. It was found that the advantage of using machine learning is that the detection can be done without relying on attack signatures they can learn broader definitions of attack attributes.

Cite

CITATION STYLE

APA

Najjar, F., Kadhum, M. M., & El-Taj, H. (2016). Detecting neighbor discovery protocol-based flooding attack using machine learning techniques. In Lecture Notes in Electrical Engineering (Vol. 387, pp. 129–139). Springer Verlag. https://doi.org/10.1007/978-3-319-32213-1_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free