@article {10.3844/jcssp.2019.702.727, article_type = {journal}, title = {Impacts Evaluation of DoS Attacks Over IPv6 Neighbor Discovery Protocol}, author = {Ahmed, Amjed Sid and Hassan, Rosilah and Othman, Nor Effendy and Ahmad, Nor Idayu and Kenish, Yassir}, volume = {15}, number = {5}, year = {2019}, month = {May}, pages = {702-727}, doi = {10.3844/jcssp.2019.702.727}, url = {https://thescipub.com/abstract/jcssp.2019.702.727}, abstract = {The Neighbor Discovery Protocol (NDP) is one of the main protocols in the Internet Protocol version 6 (IPv6) suite. It provides many basic functions for the normal operations of IPv6 in a Local Area Network (LAN), such as address auto-configuration and address resolution. However, NDP has several vulnerabilities that can be used by malicious nodes to launch attacks, because NDP messages are easily spoofed. Surrounding this problem many solutions have been proposed for securing NDP but these solutions either proposed new protocols that need to be supported by all nodes or built mechanisms that require the cooperation of all nodes. In this paper we overview NDP vulnerabilities and available solutions to overcome their impacts on IPv6 network. In addition a research test bed setup to implement these vulnerabilities was introduced. Moreover attacks that prove these vulnerabilities are implemented on different types of operating systems, Windows and Linux platforms. Three network metrics throughput, delay and resources consumption have been chosen to investigate, analyze and evaluate the impacts of NDP related attacks on IPv6 link-local communication. Overall, the results had shown that performance of Linux based operating system is better than Windows based operating system.}, journal = {Journal of Computer Science}, publisher = {Science Publications} }