Effectiveness of security tools to anomalies on tunneled traffic
Tunneling Mechanism has been proven as an option to link the communication between IPv6 networks and IPv4 environments without incurring the high costs of upgrading equipment. However, this mechanism has reduced the network performance and downgrade the level of security if compared to the native IP...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Asian Network for Scientific Information
2012
|
Online Access: | http://eprints.utem.edu.my/id/eprint/11204/1/Effectiveness_of_Security_Tools_to_Anomalies_on_Tunneled_Traffic.pdf http://eprints.utem.edu.my/id/eprint/11204/ https://scialert.net/fulltext/?doi=itj.2012.191.199 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utem.eprints.11204 |
---|---|
record_format |
eprints |
spelling |
my.utem.eprints.112042023-06-28T16:23:29Z http://eprints.utem.edu.my/id/eprint/11204/ Effectiveness of security tools to anomalies on tunneled traffic Bahaman, Nazrulazhar Anton Satria, Prabuwono Mas'ud, Mohd Zaki Abdollah, Mohd Faizal Tunneling Mechanism has been proven as an option to link the communication between IPv6 networks and IPv4 environments without incurring the high costs of upgrading equipment. However, this mechanism has reduced the network performance and downgrade the level of security if compared to the native IPv6 network. The Transition Mechanism has also become a covert channel for spreading threats without being acknowledged by the network security tools. Even though the issue has been raised in the set of IETF rules, still they do not provide any recommendation to overcome the problem. Based on this reason, this study explored the effectiveness of conventional network security tools to detect any anomalies occurring on a tunneling mechanism especially against packet flooding attack in IPv6 tunneling. In order to achieve this objective, a testbed that has been deployed with conventional firewall and IDS is used to simulate the IPv6 to IPv4 tunneling mechanism, several network attacks are then launched and the network traffic is then captured to be analyzed. The result shows that the firewall with the default settings had blocked all the tunneling packets, while the firewall and IDS with the default rule of set had performed well in IPv4 but not in the IPv6 tunnel. Asian Network for Scientific Information 2012 Article PeerReviewed application/pdf en http://eprints.utem.edu.my/id/eprint/11204/1/Effectiveness_of_Security_Tools_to_Anomalies_on_Tunneled_Traffic.pdf Bahaman, Nazrulazhar and Anton Satria, Prabuwono and Mas'ud, Mohd Zaki and Abdollah, Mohd Faizal (2012) Effectiveness of security tools to anomalies on tunneled traffic. Information Technology Journal, 11 (2). pp. 191-199. ISSN 1812-5638 https://scialert.net/fulltext/?doi=itj.2012.191.199 10.3923/itj.2012.191.199 |
institution |
Universiti Teknikal Malaysia Melaka |
building |
UTEM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknikal Malaysia Melaka |
content_source |
UTEM Institutional Repository |
url_provider |
http://eprints.utem.edu.my/ |
language |
English |
description |
Tunneling Mechanism has been proven as an option to link the communication between IPv6 networks and IPv4 environments without incurring the high costs of upgrading equipment. However, this mechanism has reduced the network performance and downgrade the level of security if compared to the native IPv6 network. The Transition Mechanism has also become a covert channel for spreading threats without being acknowledged by the network security tools. Even though the issue has been raised in the set of IETF rules, still they do not provide any recommendation to overcome the problem. Based on this reason, this study explored the effectiveness of conventional network security tools to detect any anomalies occurring on a tunneling mechanism especially against packet flooding attack in IPv6 tunneling. In order to achieve this objective, a testbed that has been deployed with conventional firewall and IDS is used to simulate the IPv6 to IPv4 tunneling mechanism, several network attacks are then launched and the network traffic is then captured to be analyzed. The result shows that the firewall with the default settings had blocked all the tunneling packets, while the firewall and IDS with the default rule of set had performed well in IPv4 but not in the IPv6 tunnel. |
format |
Article |
author |
Bahaman, Nazrulazhar Anton Satria, Prabuwono Mas'ud, Mohd Zaki Abdollah, Mohd Faizal |
spellingShingle |
Bahaman, Nazrulazhar Anton Satria, Prabuwono Mas'ud, Mohd Zaki Abdollah, Mohd Faizal Effectiveness of security tools to anomalies on tunneled traffic |
author_facet |
Bahaman, Nazrulazhar Anton Satria, Prabuwono Mas'ud, Mohd Zaki Abdollah, Mohd Faizal |
author_sort |
Bahaman, Nazrulazhar |
title |
Effectiveness of security tools to anomalies on tunneled traffic |
title_short |
Effectiveness of security tools to anomalies on tunneled traffic |
title_full |
Effectiveness of security tools to anomalies on tunneled traffic |
title_fullStr |
Effectiveness of security tools to anomalies on tunneled traffic |
title_full_unstemmed |
Effectiveness of security tools to anomalies on tunneled traffic |
title_sort |
effectiveness of security tools to anomalies on tunneled traffic |
publisher |
Asian Network for Scientific Information |
publishDate |
2012 |
url |
http://eprints.utem.edu.my/id/eprint/11204/1/Effectiveness_of_Security_Tools_to_Anomalies_on_Tunneled_Traffic.pdf http://eprints.utem.edu.my/id/eprint/11204/ https://scialert.net/fulltext/?doi=itj.2012.191.199 |
_version_ |
1770555151897067520 |
score |
13.214268 |