Abstract

In IPv6, the DAD (Duplicate Address Detection) protocol detects duplicate addresses configured on the local link. Once the IPv6 address is auto configured on an IPv6 enabled host, the host verifies that its address is unique using the DAD procedure. This protocol works when hosts can communicate. If the DAD protocol fails to detect duplication, both the hosts assign the same link-local address. The neighbor discovery protocol verifies the generated address is unique or already exists on the local link. This process is known as Duplicate Address Detection (DAD). This process has critical security vulnerability and is susceptible to many attacks, especially allowing hackers to perform denial of service attacks (DOS). With that, the new devices will not be able to join the network. Researchers have developed various techniques to address DAD vulnerabilities, such as NDPMon, SEND, and Software-defined networking, SAVA, and extension headers. These techniques appear to be neither robust nor performance-oriented with DAD’s DOS detection and mitigation techniques. We have proposed a novel approach that detects and mitigates DOS attacks consuming low bandwidth and overhead.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call