Abstract

Mixed IPv4/IPv6 networks will continue to use mobility support over tunneling mechanisms for a long period of time until the establishment of IPv6 end-to-end connectivity. Encapsulating IPv6 traffi c within IPv4 increases the level of hiding internal contents. Thus, mobility in mixed IPv4/IPv6 networks introduces new security vulnerabilities. One of the most critical vulnerabilities associated with the IPv6 protocol is the routing header that potentially may be used by attackers to bypass the network security devices. This paper proposes an algorithm (V6HAPA) for protecting home agent clients from the routing header vulnerability, considering that the home agents reside behind an IPv4 Network Address Translation (NAT) router. The experimental results show that the V6HAPA provides enough confidence to protect the home agent clients from attackers.

Highlights

  • Wireless technologies are being more widely applied today across the world in various fields of sciences and industries

  • The first arrow refers to the time that is consumed in filtering around 3500 packets without routing header (RH)

  • The second arrow refers to the time that is consumed in filtering around 500 suspicious packets with RHs

Read more

Summary

INTRODUCTION

Wireless technologies are being more widely applied today across the world in various fields of sciences and industries. False positive occurres because the proposed algorithm rejects all the suspicious packets (i.e., malicious and normal packets) carrying unmatched IPv6 routing header addresses. The experiments exhibit the ability of the V6HAPA algorithm in protecting the networks from the attackers who have exploited the IPv6 RH function as well as demonstrate the performance in term of processing time and accuracy. We consider the experiments for evaluating the performance (in term of packet filtering time) of the V6HAPA algorithm to detect suspicious packets containing RH0 and its accuracy in filtering such packets without disturbing normal packets containing the same headers To this end, the Abley et al, (2007) suggestions are employed. We conduct an experiment for this scenario, and the results have been subsequently used to calculate the accuracy of the V6HAPA algorithm in terms of preventing the HA from RH0 vulnerability using Equation (1) and Equation (2)

Normal packets
Packets containing more than 1 matched RH Dest IP address RH2
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.