Reconnaissance Attack on IPv6 to IPv4 Tunneling

Reconnaissance Attack on IPv6 to IPv4 Tunneling

Nazrulazhar Bahama (Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia), Anton Satria Prabuwono (Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia) and Teddy Mantoro (Advanced Informatics School, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia)
DOI: 10.4018/jmcmc.2013010101
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Internet Protocol version 6 (IPv6) is created to occupy the insufficient current Internet addresses. Consequently this significant contribution offers huge number of Internet addresses. Besides, the security also has been improved to challenge today threats in competent on IPv6 network. As alternative, an automatic tunneling was introduced along with other transition mechanisms to ensure smooth implementation on existing network. However, it’s believed that the implementation of automatic tunneling has altered the form of the IPv4 threats. Then the gained information from this mechanism is exploited to attempt the target network. As a concern, this paper thoroughly describes on potential of reconnaissance attack reach through automatic tunneling named 6to4 Tunneling. The preference development tools and networking defense mechanism suite, is setup to conduct proposed attack method under 6to4 tunnel testbed environment. As a result, the attacking method is feasible to attempt and 6to4 tunnel showed their influence on the achievement of DoS attack in current internet.
Article Preview

Introduction

IPv6 is a new protocol of internet was developed by Internet Engineering Task Force (IETF) to replace the existing protocol (Raicu & Zeadally, 2003). Initially, the deployments of previous researches were to identify constraints that may occur in IPv6. Throughout years, Transition Mechanism (TM) has been inspired in order to ensure a successful integration of IPv6 into an existing network (AlJaafreh et al., 2008; Narayan & Tauch, 2010). As referred to (Waddington & Fangzhe, 2002), TMs are identified into three main categories based on their operation and the way of their implementation: dual stack mechanisms (Durand, 2001; Hirorai & Yoshifuji, 2006), tunneling mechanisms (Vazao et al., 2004; Waddington & Fangzhe, 2002), and translation mechanisms (Grosse & Lakshman, 2003; Kawarasaki et al., 2003). Among of these mechanism, tunneling is widest implemented nowadays.

IPv6 mandates the inclusion of IP Security (IPsec) (Kent & Atkinson, 1998; Zagar & Grgic, 2006) makes it is more secure than IPv4. Thus, most of threats that dominate the IPv4 network are no longer effective on IPv6 networks (Xinyu et al., 2007). As a result, some of current security issues can be mitigated in the future implementation. However, after a few years of IPv6 services, some of IPv4 threats have been discovered by researchers at the IPv6 environment (Liu et al., 2009). In addition, the researcher in (Bahaman et al., 2011) stated that this automatic tunneling as a reason for the spreader threats without being detected by intrusion detection tools. Even though, it has been acknowledged by (Deering & Hinden, 1998; Savola & Patel, 2004) about this situation, but the only provide a more theoretical approach on their proposed steps.

As a significant, this paper proposes the possible methods of reconnaissance attack through the medium of 6to4 tunneling. The method focuses on silent mode of reconnaissance attacks; to determine which tunneling interfaces within a subnet are alive. Firstly, the possible method of the attack is review and identified. Then, this method is presented in equation form to understand clearly. Here, the testbed was developed in order to acquire the desired environment. Next, the proposed attacks were constructed and triggered through the testbed. The mentioned attack were carried out using a Python platform tool, Scapy (Burns et al., 2007; Hogg & Vyncke, 2009). At same time packet analyzer was appointed as monitoring and validating function.

The following section of this paper will explain the background of tunneling mechanism and DoS threats. The explanation on methods and testing scenario is detailed in the following section. There will be a further discussion on the experiment in the section afterwards. Then we will further discuss the test results. Finally, the conclusion for this research is explained.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing