Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2523514.2527001acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

A flexible framework for detecting IPv6 vulnerabilities

Published: 26 November 2013 Publication History

Abstract

Security has recently become a very important concern for entities using IPv6 networks. This is especially true with the recent news reports where governments and companies have admitted to credible cyber attacks against them in which confidential information and the security of data have been compromised. In this paper we will introduce a flexible framework that can be used for penetration testing of IPv6 networks. Due to the large address space in each of the IPv6 subnets, the traditional scanning approaches do not work. Here we introduce our new scanning algorithm which will find the IPv6 nodes on the Internet which are using Domain Name System (DNS) servers. Our implementation results showed that the use of the DNS Security Extension (DNSSEC) with NSEC3 [4], which is a new and promising approach for the prevention of zone walking, was not able to prevent us from gathering information about nodes on different networks.

References

[1]
R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. Protocol Modifications for the DNS Security Extensions. IETF, Mar. 2005. http://tools.ietf.org/html/rfc4035.
[2]
S. Cheshire and M. Krochmal. Multicast DNS. IETF, Feb. 2013. http://tools.ietf.org/html/rfc6762.
[3]
S. Deering and R. Hinden. Internet Protocol, Version 6 (IPv6) Specification. IETF, Dec. 1998. http://tools.ietf.org/html/rfc2460.
[4]
B. Laurie, G. Sisson, R. Arends, and D. Blacka. DNS Security (DNSSEC) Hashed Authenticated Denial of Existence. IETF, Mar. 2008. http://tools.ietf.org/html/rfc5155.
[5]
G. F. Lyon. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. ISBN-10 0-9799587-1-7, Jan. 2009.
[6]
P. Mockapetris. Domain Names - Implementation and Specification. IETF, Nov. 1987. http://tools.ietf.org/html/rfc1035.
[7]
C. Ottow, F. van Vliet, P. de Boer, and A. Pras. The Impact of IPv6 on Penetration Testing. Springer, 7479: 88--99, Auguest 2012.
[8]
H. Rafiee, M. v. Loewis, and C. Meinel. Challenges and Solutions for DNS Security in IPv6. IGI, http://www.igi-global.com/chapter/challenges-and-solutions-for-dns-security-in-ipv6/78870, 2013.
[9]
Peach fuzzer. Secure Development and Security Advisory Service, 2013. http://peachfuzzer.com/.

Cited By

View all
  • (2024)Zone-Hopping: Sensitive Information Leakage Prevention for DNSSEC-NSEC2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S)10.1109/DSN-S60304.2024.00035(104-110)Online publication date: 24-Jun-2024
  • (2019)Necessary Standard for Providing Privacy and Security in IPv6 NetworksCyber Law, Privacy, and Security10.4018/978-1-5225-8897-9.ch017(327-345)Online publication date: 2019
  • (2019)Finding a needle in a haystack - A comparative study of IPv6 scanning methods2019 International Symposium on Networks, Computers and Communications (ISNCC)10.1109/ISNCC.2019.8909131(1-6)Online publication date: Jun-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
November 2013
483 pages
ISBN:9781450324984
DOI:10.1145/2523514
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Macquarie U., Austarlia
  • MNIT: Malaviya National Institute of Technology
  • Aksaray Univ.: Aksaray University
  • SFedU: Southern Federal University

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 November 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. DNSSEC
  2. IPv6
  3. NSEC3
  4. attacks
  5. fuzzier approach
  6. penetration test
  7. privacy
  8. security
  9. zone walking

Qualifiers

  • Research-article

Conference

SIN '13
Sponsor:
  • MNIT
  • Aksaray Univ.
  • SFedU

Acceptance Rates

Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Zone-Hopping: Sensitive Information Leakage Prevention for DNSSEC-NSEC2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S)10.1109/DSN-S60304.2024.00035(104-110)Online publication date: 24-Jun-2024
  • (2019)Necessary Standard for Providing Privacy and Security in IPv6 NetworksCyber Law, Privacy, and Security10.4018/978-1-5225-8897-9.ch017(327-345)Online publication date: 2019
  • (2019)Finding a needle in a haystack - A comparative study of IPv6 scanning methods2019 International Symposium on Networks, Computers and Communications (ISNCC)10.1109/ISNCC.2019.8909131(1-6)Online publication date: Jun-2019
  • (2014)Necessary Standard for Providing Privacy and Security in IPv6 NetworksInformation Security in Diverse Computing Environments10.4018/978-1-4666-6158-5.ch007(109-126)Online publication date: 2014
  • (2014)GPU-Based NSEC3 Hash BreakingProceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications10.1109/NCA.2014.27(137-144)Online publication date: 21-Aug-2014

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media