Home > Published Issues > 2020 > Volume 9, No. 4, July 2020 >

Denial of Service Attack on Neighbor Discovery Protocol Processes in the Network of IPv6 Link- Local

Ghaith Mousa Hamzah Amlak1, Firas Qays Kamal2, and Ahmed K. Al-Ani3
1. General Directorate of Education Babylon, Ministry of Education Iraq, Babylon, Iraq
2. General Directorate of Education Al Qadisiyah, Ministry of Education Iraq, Al Qadisiyah, Iraq
3. National Advanced IPv6 Center (Nav6), Universiti Sains Malaysia 11800 USM, Penang, Malaysia

AbstractMost devices are nowadays connected automatically via an IPv6 address. IPv6 was developed in 1998 so that the IPv4 address space issues are solved. Due to rapid technological advancements, i.e., the internet of things (IoT), IPv4 is no more efficiently functioning. Therefore, IPv6 introduced with a novel protocol, i.e., Neighbor Discovery Protocol (NDP). It involves many processes to facilitate the communication operation between nodes (hosts and router) that are located on the same link. NDP does not have any verification mechanism to validate the exchange messages, whether it comes from the legitimate or illegitimate node. Besides, the NDP messages are not secure by its design. Therefore, an attacker may manipulate these messages and perform attacks such as Denial of Service (DoS) attack which is considered a frequent attack that threatens the network of the NDP IPv6 link-local. We have reviewed in this paper the main processes of NDP and the security issues of these processes. In addition, the experiments result shown the NDP processes are completely vulnerable to the DoS attack. Thus, the future direction involves developing a prevention mechanism that aims at securing the NDP processes in the network of IPv6 link-local.  
 
Index Terms—DoS attack, IPv6 link-local network, NDP processes

Cite: Ghaith Mousa Hamzah Amlak, Firas Qays Kamal, and Ahmed K. Al-Ani, "Denial of Service Attack on Neighbor Discovery Protocol Processes in the Network of IPv6 Link- Local," International Journal of Electrical and Electronic Engineering & Telecommunications, Vol. 9, No. 4, pp. 247-251, July 2020. Doi: 10.18178/ijeetc.9.4.247-251

Copyright © 2020 by the authors. This is an open access article distributed under the Creative Commons Attribution License (CC BY-NC-ND 4.0), which permits use, distribution and reproduction in any medium, provided that the article is properly cited, the use is non-commercial and no modifications or adaptations are made.