Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.

Slides:



Advertisements
Similar presentations
Security Issues In Mobile IP
Advertisements

Internetworking II: MPLS, Security, and Traffic Engineering
Introduction to IPv6 Presented by: Minal Mishra. Agenda IP Network Addressing IP Network Addressing Classful IP addressing Classful IP addressing Techniques.
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
2: Comparing IPv4 and IPv6 Rick Graziani Cabrillo College
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Engineering Workshops IPv6 “Under the Hood”. Engineering Workshops IPv6 Tutorial/Workshop Rick Summerhill Executive Director, Great Plains Network Dale.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
Group members:- Himasweta pattanaik M.A.Sravni Liakat ali khan Agamani karmakar.
CS 6401 IPv6 Outline Background Structure Deployment.
1 IPv6 Address Management Rajiv Kumar. 2 Lecture Overview Introduction to IP Address Management Rationale for IPv6 IPv6 Addressing IPv6 Policies & Procedures.
1Group 07 IPv6 2 1.ET/06/ ET/06/ ET/06/ EE/06/ EE/06/ EE/06/6473 Group 07 IPv6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 9 Internet Control Message.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
7 IPv6: transition and security challenges Selected Topics in Information Security – Bazara Barry.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
10/8/2015CST Computer Networks1 IP Routing CST 415.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
Introduction to IPv6 Presented by:- ASHOK KUMAR MAHTO(09-026) & ROHIT KUMAR(09-034), BRANCH -ECE.
Dr. John P. Abraham Professor UTPA
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 19 Network Layer Protocols Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
19.1 Chapter 19 Network Layer: Logical Addressing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
An Analysis of IPv6 Security CmpE-209: Team Research Paper Presentation CmpE-209 / Spring Presented by: Dedicated Instructor: Hiteshkumar Thakker.
ICMPv6 Error Message Types Informational Message Types.
Chapter 27 IPv6 Protocol.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Chapter 3 TCP and IP 1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Internet.
6to4
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
Network Layer Protocols COMP 3270 Computer Networks Computing Science Thompson Rivers University.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
A Classification for Access Control List To Speed Up Packet-Filtering Firewall CHEN FAN, LONG TAN, RAWAD FELIMBAN and ABDELSHAKOUR ABUZNEID Department.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Author:Zarei.M.;Faez.K. ;Nya.J.M.
IPSecurity.
Internet Protocol Version 6 Specifications
Chapter 3 TCP and IP Chapter 3 TCP and IP.
Introduction Wireless devices offering IP connectivity
Chapter 19 Network Layer Protocols
Next Generation: Internet Protocol, Version 6 (IPv6) RFC 2460
The New Internet Protocol
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
The New Internet Protocol
Chapter 20 Network Layer: Internet Protocol
Net 323 D: Networks Protocols
Chapter 15. Internet Protocol
Lec 10 IP V6 3.1 Computer Networks Al-Mustansiryah University
ITIS 6167/8167: Network and Information Security
Lecture 4a Mobile IP 1.
NET 323D: Networks Protocols
Internet Protocol version 6 (IPv6)
Presentation transcript:

Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour Abuzneid. Department of Computer Engineering, University of Bridgeport, CT. Abstract IP Traceback and Time-to-Live Conclusion: Introduction Proposed Solution: The proposed methods used in this research paper include the operations of combining IP traceback toolset with Time-to-Live calculation technique. Due to the fact that TTL is part of the hop limit field within the IPv6 header that implements the hop counting process, allows the analysis of tracing back through paths successful. The analysis of IP traceback is possible from the Ant algorithm. The process that takes place throughout the network is inspected by the method of the ant algorithm, which allows the shortest path to be found, which also verifies as the path of a legitimate request due to the fact that the shortest path is engulfed with the highest pheromone intensity. IP traceback is method in which the source of a packet is found through tracing the path from which the packet was sent. It is used for identifying source of attacks when implementing protection procedures over internet networks. Over many years IP traceback have been designed and tailored to suit the process of preventing DOS attacks and it has been found to be consistent in finding the source of IP spoofing. IP traceback by itself is just a tool used to trace paths, however when it is combined with the use of TTL it can not only trace the DOS spoofing location but detect it with Time-to-Live algorithm. IP Traceback example: The recent discovery of Internet Protocol Version 6 (IPv6) network attacks have been an interesting topic in the world of network security. Due to the fact IPv6 is still in the transition of being the main internet protocol, a lot research has been done however the implementation of it may take longer than most people thought. When it comes to being compared to its predecessor IPv4, it has all of the advantage. The lack of addresses in IPv4 is mainly the deciding factor in why the IPv6 is better. While the internet is currently based on IPv4 protocol, it can cause the progression of the internet to be hindered. IPv6 protocol has provided the capability to expand addresses for the development of more devices, simplification of address auto-configuration and authentication header format and privacy and authentication extensions. However as good as IPv6 sounds there still are security issues involving spoofing attacks that we resolve with a combination of algorithms, packet analyzers and simulation tools. IPV 6 UPDATE FROM IPV 4 – NEW HEADER FORMAT The first difference seen in the update from IPv4 to IPv6 is the header format. When IPv6 header was designed, a number of IPv4 header fields were either removed completely or replaced for better functionality. The address size of IPv6 is much larger than that of IPv4. They can be compared simply by IPv6 = 128 bit IP addresses to IPv4 = 32 bit IP addresses. The security “Option Field” in IPv4 header only addressed (DOD) specific requirements, whereas IPv6 security provided more efficient routing. IPv6 has been set to a fixed length of (40 bytes). For IPv6: The “Header Length” was replaced by “Fixed Length”. The “Total Length” was replaced by “Payload Length”. IPv4 “Segmentation Control” fields were moved into IPv6 “Fragmentation Extension Header”. IPv4 “Type of Service” is now known as IPv6 “Traffic Class” The Total Length” was replaced by “Payload Length” The “Time to Live” was replaced by “Hop Limit” The “Protocol” was replaced by “Next Header Type”. THIS document describes the use of IPv6 spoofing as a method of attacking a secure network with the purpose of gaining unauthorized access to private packets sent over the network. Internet communications between devices are routinely handled by routers which are protected by IPv6. The deployment of IPv6 to all enterprises will be here sooner than later. The security issue that is of main concern in this paper is called SPOOFING. Spoofing security attack can be performed in many different ways such as spoofing, Neighbor Solicitation (NS)/ Neighbor Advertisement (NA), Router Solicitation(RS)/Router Advertisement (RA) spoofing attack and IP spoofing – Denial-of-Service (DOS). In this paper we are going to focus on IP spoofing which is based on the act of attacker faking the identity of a legitimate user by replicating the users IP address and obtaining the intended packets sent to the user for the attackers self. It can be classified based on the direction of the attack in three different forms (Outgoing attack, Incoming attack and Internal attack). In principle the attacker is fooling (spoofing) a distant device in to believing that they are an authorized member of the network with no malicious intentions. One of the most well-known spoofing attacks is DOS which is usually launched on DNS servers and the Internet which are critical infrastructures Hop count Fig. 1 Hop count across a network. Mathematics: Ant Algorithm j = exploitation policy whereby the path with the highest visibility and most pheromone intensity. Random decision rule whereby any ant situated at node i will hop to the next random calculated node j. S = Fig.2 IP Traceback: Ant Algorithm Figure 2 shows the IP Trace back from Source to Destination using all possible paths and to get there. Example: Path: Src  2  5  Dst  = shortest path = most Pheromone Path: Src  1  4  7  Dst Path: Src  3  6  8  Dst Shortest path process is found by the mathematical equation along with the random decision rule. An IP spoofing attack occurs during the transmission and therefore the proposed solution of combining IP traceback technique using the Ant algorithm and Time-to-Live (TTL) which is already found in the IPv6 header is implemented. The calculated process counts the number of hops from the victims address back to the IP spoofing attack source in order to analyze whether it was the same path that the original was transmitted through. The resulted outcome depends on the conclusion of whether he forward hop count is the same as the reversed hop count. Once the hop counts are equal, the request qualifies as legitimate and the packet is received, however if the hop counts are not equal, the request is then said to be partially spoofed and therefore the packet is dropped and discarded. Graphical Description of Proposed Solution: The process in Fig.3 describe the steps in which an IPv6 packet is transmitted over a network using the encapsulated technique tunneling. An IP spoofing attack occurs during the transmission and therefore the proposed solution of combining IP traceback technique using the Ant algorithm and Time-to-Live (TTL) which is already found in the IPv6 header is implemented. The resulted outcome depends on the conclusion of whether he forward hop count is the same as the reversed hop count. Once the hop counts are equal, the request qualifies as legitimate and the packet is received, however if the hop counts are not equal, the request is then said to be partially spoofed and therefore the packet is dropped and discarded. Fig.3 Flow Table