Icmpv6 ECHO REQUEST Ddos ATTACK DETECTION FRAMEWORK USING BACK- PROPAGATION NEURAL NETWORK

Icmpv6 ECHO REQUEST Ddos ATTACK DETECTION FRAMEWORK USING BACK- PROPAGATION NEURAL NETWORK

View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Repository@USM ICMPv6 ECHO REQUEST DDoS ATTACK DETECTION FRAMEWORK USING BACK- PROPAGATION NEURAL NETWORK REDHWAN MOHAMMED AHMED SAAD UNIVERSITI SAINS MALAYSIA 2016 ICMPv6 ECHO REQUEST DDoS ATTACK DETECTION FRAMEWORK USING BACK- PROPAGATION NEURAL NETWORK By REDHWAN MOHAMMED AHMED SAAD Thesis submitted in fulfillment of the requirements for the degree of Doctor of Philosophy March 2016 DEDICATION To my appreciated father “Mohammed Ahmed Saad”, To my dearest mother “Fatimah Mohammed Naji”, To my dearest brother “Dr. Ali Al-Nakhlany” To my beloved wife “Manal Al-Adahi”, To my daughter “Malak”, To the memory of my beloved Yemen ACKNOWLEDGEMENT { } (76- سورة يوسف) All praise and thanks are due to ALLAH SUBHANH WA TAALA, the Lord of the world, for giving me the health, strength, knowledge and patience to complete this work Whom His Majesty Said (And remember! your Lord caused to be declared (publicly): "If you are grateful, I will add more (favours) unto you." (Ibrahim: 7). Since the Prophet MOHAMMED “Peace be Upon Him” said: 'Whoever does not thank people (for their favours) has not thanked Allah (properly)', therefore, I would like to express my deep gratitude to my main supervisor Dr. Selvakumar Manickam for all his support, patience and guidance during this research. He has widened my horizon in conducting the research. His contributions were invaluable, extraordinary and his way of directing a student was unique. Furthermore, my appreciation and sincere gratitude go to the co-supervisor Dr. Mohammed Anbar for his diversified help, support and encouragement. I am privileged to be under the supervision of these supervisors during the PhD research years. I would like to express my gratitude and thanks to all NAv6 centre members my colleagues, technicians, and administrative staff. My Acknowledgement also goes to the Institute of Postgraduate Studies, and the university library for their help and support. As well as, I would like to express my great thankful to Dr. Mohammed M. Kadhum and Dr. Kamal M. Al-Henadawi for their great help and support during this study. ii My sincere thanks also go to my family those who are always in my heart; my father for his endless and continuous encouragement and constant support, my mother for her continuous prayers and inspiration. My sincere gratitude goes to my dearest brothers for their continuous supporting and encouragement. In addition to, my sisters for always keeping a smile on my face and motivating me all the time. Moreover, I would like to express great thanks to the Ibb University, Yemen for its distinguished cooperation, support and help during the research period. Also, thanks go to my friends for their support and encouragement during the PhD research. Redhwan Mohammed Ahmed Saad Penang, Malaysia, March 2016 iii TABLE OF CONTENTS Page ACKNOWLEDGEMENT ........................................................................................... ii TABLE OF CONTENTS ............................................................................................ iv LIST OF TABLES….... ............................................................................................... x LIST OF FIGURES …. ............................................................................................. xii LIST OF ABBREVIATIONS .................................................................................... xv ABSTRAK …………... ........................................................................................... xvii ABSTRACT ………… ............................................................................................. xix CHAPTER ONE - INTRODUCTION 1.1 Overview .......................................................................................................... 1 1.1.1 Internet Control Message Protocol version 6 (ICMPv6) ............................. 2 1.1.2 ICMPv6 Security Considerations ................................................................ 4 1.1.2.1 DoS/DDoS via ICMPv6 ....................................................................... 5 1.1.2.2 Probing via ICMPv6 ............................................................................ 6 1.1.2.3 Problems Resulting from ICMPv6 Transparency ................................ 6 1.1.2.4 Flooding Attack via ICMPv6 ............................................................... 7 1.2 Research Motivation ........................................................................................ 9 1.3 Research Problem ............................................................................................. 9 1.4 Research Objectives and Goals ...................................................................... 12 1.5 Research Contribution .................................................................................... 12 1.6 Research Scope and Limitation ...................................................................... 13 1.7 Research Steps ................................................................................................ 14 1.8 Thesis Organization ........................................................................................ 16 iv CHAPTER TWO - BACKGROUND AND LITERATURE REVIEW 2.1 Introduction .................................................................................................... 18 2.2 Typical Attack on IPv6 .................................................................................. 20 2.2.1 Misuse of ICMPv6 and Multicast .............................................................. 20 2.2.2 Reconnaissance Attacks ............................................................................ 21 2.2.3 Fragmentation-Related Attacks ................................................................. 22 2.2.4 IPv6 Neighbour Discovery Flooding Attack ............................................. 22 2.2.5 DDoS Flooding Attacks on IPv6 ............................................................... 24 2.2.6 ICMPv6-based Attacks .............................................................................. 26 2.2.6.1 Spoofed ICMPv6 Neighbour Advertisement ..................................... 26 2.2.6.2 Spoofed ICMPv6 Router Advertisement............................................ 28 2.3 Prevention Mechanisms for IPv6-based Attacks ........................................... 30 2.3.1 IPSec .......................................................................................................... 30 2.3.2 Secure Neighbour Discovery ..................................................................... 31 2.4 Approaches in DoS/DDoS Attack Detection ................................................. 32 2.4.1 Intrusion Detection System for IPv6 ......................................................... 32 2.4.1.1 Signature-Based Intrusion Detection System (SBIDS) ...................... 34 2.4.1.2 Anomaly-Based Intrusion Detection System (ABIDS) ...................... 36 2.4.2 Neural Network-Based Training DoS/DDoS Detection ............................ 38 2.4.3 Back-propagation Neural Network ............................................................ 40 2.4.4 Threshold-Based DoS/DDoS Attack Detection Mechanisms ................... 43 2.4.4.1 Trained Thresholds ............................................................................. 44 2.4.4.2 Predefined Thresholds ........................................................................ 45 2.4.4.3 Adaptive Thresholds ........................................................................... 46 2.5 Features Selection Techniques ....................................................................... 47 v 2.5.1 Feature Ranking using Information Gain Ratio ........................................ 48 2.5.2 Features Extraction using Principal Component Analysis ........................ 49 2.6 Summary ........................................................................................................ 52 CHAPTER THREE - RESEARCH METHODOLOGY FOR DETECTING ICMPv6 FLOODING ATTACKS 3.1 Introduction .................................................................................................... 55 3.2 Overview of the Proposed Framework ........................................................... 55 3.3 Requirement of the Proposed v6IDSF ........................................................... 57 3.4 Proposed Framework ...................................................................................... 60 3.4.1 Stage 1 (Data Collection and Pre-processing) ........................................... 62 3.4.1.1 Packet Capture .................................................................................... 62 3.4.1.2 Packet Filtering ................................................................................... 65 3.4.2 Stage 2 (Network Traffic Analysis)........................................................... 66 3.4.2.1 Feature Ranking.................................................................................. 66 3.4.2.2 Feature Extraction .............................................................................. 68 3.4.3 Stage 3 (Anomaly-based Detection) .......................................................... 69 3.4.3.1 Aggregation of IPv6 Packets .............................................................. 70 3.4.3.2 Rule-based ICMPv6 Anomalous Behaviour Detection ...................... 71 3.4.4 Stage 4 (Verification of ICMPv6 Flooding Detection) ............................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    46 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us