Service interruption on Monday 11 July from 12:30 to 13:00: all the sites of the CCSD (HAL, EpiSciences, SciencesConf, AureHAL) will be inaccessible (network hardware connection).
Skip to Main content Skip to Navigation
Conference papers

Flow-Based Detection of IPv6-specific Network Layer Attacks

Abstract : With a vastly different header format, IPv6 introduces new vulnerabilities not possible in IPv4, potentially requiring new detection algorithms. While many attacks specific to IPv6 have proven to be possible and are described in the literature, no detection solutions for these attacks have been proposed. In this study we identify and characterise IPv6-specific attacks that can be detected using flow monitoring. By constructing flow-based signatures, detection can be performed using available technologies such as NetFlow and IPFIX. To validate our approach, we implemented these signatures in a prototype, monitoring two production networks and injecting attacks into the production traffic.
Complete list of metadata

Cited literature [2 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Friday, June 1, 2018 - 4:00:39 PM
Last modification on : Wednesday, November 18, 2020 - 7:20:09 PM
Long-term archiving on: : Wednesday, September 26, 2018 - 12:44:59 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Luuk Hendriks, Petr Velan, Ricardo De O. Schmidt, Pieter-Tjerk De Boer, Aiko Pras. Flow-Based Detection of IPv6-specific Network Layer Attacks. 11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.137-142, ⟨10.1007/978-3-319-60774-0_11⟩. ⟨hal-01806050⟩



Record views


Files downloads