• Login
    View Item 
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Dissertations and Theses
    • View Item
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Dissertations and Theses
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Performance evaluation of defence mechanisms against ICMPv6 router advertisement flood attacks

    Mudaliar, Keysha

    Thumbnail
    Share
    View fulltext online
    Keysha Mudaliar_2015-05-07.pdf (2.860Mb)
    Date
    2015
    Citation:
    Mudaliar, K. (2015). Performance evaluation of defence mechanisms against ICMPv6 router advertisement flood attacks. An unpublished thesis submitted in partial fulfilment of the requirements for the degree of Master of Computing, Unitec Institute of Technology.
    Permanent link to Research Bank record:
    https://hdl.handle.net/10652/3090
    Abstract
    The Internet Protocol version 6 (IPv6) was developed to replace the Internet Protocol version 4 (IPv4). IPv6 provides many improvements over IPv4. However, there are major problems with new features introduced in IPv6, which are susceptible to threats such as Denial of Service (DoS) attacks. In a DoS attack, malicious network traffic is sent to the victim node to prevent it from gaining access to network resources. DoS attacks on internal IPv6 networks are among the security concerns of many organisations. The Neighbour Discovery Protocol (NDP) was introduced in IPv6. NDP processes use the Internet Control Message Protocol for IPv6 (ICMPv6). For example, the NDP Stateless Address Autoconfiguration process uses ICMPv6 Router Advertisement messages (Router Advertisements). Router Advertisements enable computers on an IPv6 network to generate IPv6 addresses for themselves. Router Advertisements can be misused to launch a link-local IPv6 DoS attacks called Router Advertisement flood attacks. The purpose of this research was to evaluate existing defence mechanisms against three types of Router Advertisement flood attacks. ACL, ACL Fragments, ACL Undetermined- transport, Disable Router Discovery, RA Guard, Validate Source MAC and VLAN were the defence mechanisms that were evaluated. A testbed was deployed and experiments were conducted by measuring the TCP throughput, TCP round-trip time (RTT) and CPU utilisation using the latest Windows and Linux operating systems namely Windows 8.1 and Debian 7.5.0. Data was gathered before and during attacks as well as after the defence mechanisms were used. ACL and ACL Undetermined-transport were the most effective defences and Disable Router Discovery, RA Guard and Validate Source MAC were the least effective defences. Overall, the performance of Debian 7.5.0 was better than Windows 8.1.
    Keywords:
    performance analysis, internet protocol, IPv6, router advertisement flood attacks, Neighbour Discovery Protocol (NDP), denial of service (DoS), Debian 7.5.0
    ANZSRC Field of Research:
    080303 Computer System Security
    Degree:
    Master of Computing, Unitec Institute of Technology
    Supervisors:
    Kolahi, Samad; Ganeshan, Kathiravelu; Jayawardena, Chandimal
    Copyright Holder:
    Author

    Copyright Notice:
    All rights reserved
    Rights:
    This digital work is protected by copyright. It may be consulted by you, provided you comply with the provisions of the Act and the following conditions of use. These documents or images may be used for research or private study purposes. Whether they can be used for any other purpose depends upon the Copyright Notice above. You will recognise the author's and publishers rights and give due acknowledgement where appropriate.
    Metadata
    Show detailed record
    This item appears in
    • Computing Dissertations and Theses [90]

    Te Pūkenga

    Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

    • About Te Pūkenga
    • Privacy Notice

    Copyright ©2022 Te Pūkenga

    Usage

    Downloads, last 12 months
    89
     
     

    Usage Statistics

    For this itemFor the Research Bank

    Share

    About

    About Research BankContact us

    Help for authors  

    How to add research

    Register for updates  

    LoginRegister

    Browse Research Bank  

    EverywhereInstitutionsStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaboratorThis CollectionStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaborator

    Te Pūkenga

    Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

    • About Te Pūkenga
    • Privacy Notice

    Copyright ©2022 Te Pūkenga