Author:
Wan Ali Wan Nor Ashiqin,Mat Taib Abidah,Syed Idrus Syed Zulkarnain
Abstract
Enterprises are required to utilize Internet Control Message Protocol version 6 (ICMPv6) when IPv6 is deployed. In IPv4, Internet Control Message Protocol (ICMP) is aggressively filtered by a network administrator while in IPv6, ICMPv6 messages cannot be aggressively filtered due to the function of ICMPv6 message. ICMPv6 security risks increase when ICMPv6 threats and vulnerabilities are exploited. Thus, it is very crucial for enterprises to address the issues. In practice, network researchers must review several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6 vulnerabilities. Overlooking any of these issues will jeopardize the security of ICMPv6. While conducting the attack scenarios testing, IPv6-Filtering Prototype System (I6-FPS) was developed to overcome the deficiency and limited filtering tools that supported IPv6 filtering rules (ip6table). I6-FPS is used to automate and simplify the writing of ip6table and it was developed using PHP5 and Shell script languages. This research revealed that I6-FPS is significant in the initial phase of securing IPv6 deployment as well as focusing on the ICMPv6 filtering rules. The I6-FPS has the potential to be enhanced and developed over time by including more functions to that system in generating specific filtering ip6table rules.
Reference12 articles.
1. Gont, T., Liu W. (2014). Security Implications of IPv6 on IPv4 Networks. Technical Report: Internet Engineering Task Force (IETF). ISSN: 2070-1721.
2. Benelbahri, M.A., & Bouhoula, A. (2007). Tuple based approach for anomalies detection within firewall filtering rules. Paper presented at the 12th IEEE Symposium on Computers and Communications (ISCC), 2007.
3. Abbes, T., Bouhoula A., & Rusinowitch, M. (2008). An inference system for detecting firewall filtering rules anomalies. Paper presented at the Proceedings of the 2008 ACM Symposium on Applied Computing.
4. Benelbahri, M. A., Bouhoula, A., & Trabelsi, Z. (2007). XML based open tool for anomalies detection in firewall filtering rules. Paper presented at the 4th International Conference on Innovations in Information Technology (IIT), 2007.
5. Wang, Y.-G., Ge, Y.-m., & Yang, J.-X. (2008, 1214 Dec. 2008). Research on packet filter rules of the firewall based on visual prolog. Paper presented at the International Conference on Computer Science and Software Engineering, 2008.