Service interruption on Monday 11 July from 12:30 to 13:00: all the sites of the CCSD (HAL, EpiSciences, SciencesConf, AureHAL) will be inaccessible (network hardware connection).
Abstract : With a vastly different header format, IPv6 introduces new vulnerabilities not possible in IPv4, potentially requiring new detection algorithms. While many attacks specific to IPv6 have proven to be possible and are described in the literature, no detection solutions for these attacks have been proposed. In this study we identify and characterise IPv6-specific attacks that can be detected using flow monitoring. By constructing flow-based signatures, detection can be performed using available technologies such as NetFlow and IPFIX. To validate our approach, we implemented these signatures in a prototype, monitoring two production networks and injecting attacks into the production traffic.
https://hal.inria.fr/hal-01806050 Contributor : Hal IfipConnect in order to contact the contributor Submitted on : Friday, June 1, 2018 - 4:00:39 PM Last modification on : Wednesday, November 18, 2020 - 7:20:09 PM Long-term archiving on: : Wednesday, September 26, 2018 - 12:44:59 PM
Luuk Hendriks, Petr Velan, Ricardo De O. Schmidt, Pieter-Tjerk De Boer, Aiko Pras. Flow-Based Detection of IPv6-specific Network Layer Attacks. 11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.137-142, ⟨10.1007/978-3-319-60774-0_11⟩. ⟨hal-01806050⟩