• Medientyp: E-Artikel
  • Titel: Using FDAD to Prevent DAD Attack in SEcure Neighbor Discovery Protocol
  • Beteiligte: Song, Guangjia; Wang, Hui; Liu, Fuquan
  • Erschienen: Hindawi Limited, 2020
  • Erschienen in: Security and Communication Networks, 2020 (2020), Seite 1-15
  • Sprache: Englisch
  • DOI: 10.1155/2020/2408792
  • ISSN: 1939-0114; 1939-0122
  • Entstehung:
  • Anmerkungen:
  • Beschreibung: The It is very important for the corresponding author to have a linked ORCID (Open Researcher and Contributor ID) account on MTS. To register a linked ORCID account, please go to the Account Update page (http://mts.hindawi.com/update/) in our Manuscript Tracking System and after you have logged in click on the ORCID link at the top of the page. This link will take you to the ORCID website where you will be able to create an account for yourself. Once you have done so, your new ORCID will be saved in our Manuscript Tracking System automatically."?SEND uses CGA as its address configuration method. CGA binds the IPv6 address with multiple auxiliary parameters, thereby making the dependency relationship between IPv6 address and host provable, which prevents address embezzlement. Owing to the considerable overhead in CGA parameter verification, the malicious host can use this point to carry out DoS attacks. To prevent DoS, the paper proposes a new duplicate address detection method in an SDN environment called FDAD. Two additional mechanisms are added to the FDAD, namely, query and feedback; messages used by the new mechanisms are also designed. Through these two mechanisms, on the one hand, the host can query the MAC address of the suspect host to the controller. On the other hand, if the CGA parameter verification fails, the controller will use feedback information to suppress malicious host from its source port in order to prevent subsequent attacks. Experiments show that the CPU overhead of FDAD is much lower than the normal CGA when suffering Denial of Service attack. The increased CPU consumption and memory overhead of the controller are also within acceptable range, and the network communication overhead is greatly reduced.
  • Zugangsstatus: Freier Zugang