Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2523514.2527001acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

A flexible framework for detecting IPv6 vulnerabilities

Published: 26 November 2013 Publication History
  • Get Citation Alerts
  • Abstract

    Security has recently become a very important concern for entities using IPv6 networks. This is especially true with the recent news reports where governments and companies have admitted to credible cyber attacks against them in which confidential information and the security of data have been compromised. In this paper we will introduce a flexible framework that can be used for penetration testing of IPv6 networks. Due to the large address space in each of the IPv6 subnets, the traditional scanning approaches do not work. Here we introduce our new scanning algorithm which will find the IPv6 nodes on the Internet which are using Domain Name System (DNS) servers. Our implementation results showed that the use of the DNS Security Extension (DNSSEC) with NSEC3 [4], which is a new and promising approach for the prevention of zone walking, was not able to prevent us from gathering information about nodes on different networks.

    References

    [1]
    R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. Protocol Modifications for the DNS Security Extensions. IETF, Mar. 2005. http://tools.ietf.org/html/rfc4035.
    [2]
    S. Cheshire and M. Krochmal. Multicast DNS. IETF, Feb. 2013. http://tools.ietf.org/html/rfc6762.
    [3]
    S. Deering and R. Hinden. Internet Protocol, Version 6 (IPv6) Specification. IETF, Dec. 1998. http://tools.ietf.org/html/rfc2460.
    [4]
    B. Laurie, G. Sisson, R. Arends, and D. Blacka. DNS Security (DNSSEC) Hashed Authenticated Denial of Existence. IETF, Mar. 2008. http://tools.ietf.org/html/rfc5155.
    [5]
    G. F. Lyon. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. ISBN-10 0-9799587-1-7, Jan. 2009.
    [6]
    P. Mockapetris. Domain Names - Implementation and Specification. IETF, Nov. 1987. http://tools.ietf.org/html/rfc1035.
    [7]
    C. Ottow, F. van Vliet, P. de Boer, and A. Pras. The Impact of IPv6 on Penetration Testing. Springer, 7479: 88--99, Auguest 2012.
    [8]
    H. Rafiee, M. v. Loewis, and C. Meinel. Challenges and Solutions for DNS Security in IPv6. IGI, http://www.igi-global.com/chapter/challenges-and-solutions-for-dns-security-in-ipv6/78870, 2013.
    [9]
    Peach fuzzer. Secure Development and Security Advisory Service, 2013. http://peachfuzzer.com/.

    Cited By

    View all
    • (2019)Necessary Standard for Providing Privacy and Security in IPv6 NetworksCyber Law, Privacy, and Security10.4018/978-1-5225-8897-9.ch017(327-345)Online publication date: 2019
    • (2019)Finding a needle in a haystack - A comparative study of IPv6 scanning methods2019 International Symposium on Networks, Computers and Communications (ISNCC)10.1109/ISNCC.2019.8909131(1-6)Online publication date: Jun-2019
    • (2014)Necessary Standard for Providing Privacy and Security in IPv6 NetworksInformation Security in Diverse Computing Environments10.4018/978-1-4666-6158-5.ch007(109-126)Online publication date: 2014
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
    November 2013
    483 pages
    ISBN:9781450324984
    DOI:10.1145/2523514
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • Macquarie U., Austarlia
    • MNIT: Malaviya National Institute of Technology
    • Aksaray Univ.: Aksaray University
    • SFedU: Southern Federal University

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 November 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. DNSSEC
    2. IPv6
    3. NSEC3
    4. attacks
    5. fuzzier approach
    6. penetration test
    7. privacy
    8. security
    9. zone walking

    Qualifiers

    • Research-article

    Conference

    SIN '13
    Sponsor:
    • MNIT
    • Aksaray Univ.
    • SFedU

    Acceptance Rates

    Overall Acceptance Rate 102 of 289 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)10
    • Downloads (Last 6 weeks)1

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Necessary Standard for Providing Privacy and Security in IPv6 NetworksCyber Law, Privacy, and Security10.4018/978-1-5225-8897-9.ch017(327-345)Online publication date: 2019
    • (2019)Finding a needle in a haystack - A comparative study of IPv6 scanning methods2019 International Symposium on Networks, Computers and Communications (ISNCC)10.1109/ISNCC.2019.8909131(1-6)Online publication date: Jun-2019
    • (2014)Necessary Standard for Providing Privacy and Security in IPv6 NetworksInformation Security in Diverse Computing Environments10.4018/978-1-4666-6158-5.ch007(109-126)Online publication date: 2014
    • (2014)GPU-Based NSEC3 Hash BreakingProceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications10.1109/NCA.2014.27(137-144)Online publication date: 21-Aug-2014

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media