Effectiveness of security tools to anomalies on tunneled traffic

Tunneling mechanism has been proven as an option to link the communication between IPv6 networks and IPv4 environments without incurring the high costs of upgrading equipment. However, this mechanism has reduced the network performance and downgrade the level of security if compared to the native IP...

詳細記述

保存先:
書誌詳細
主要な著者: Bahaman, Nazrulazhar, Prabuwono, Anton Satria, Mas'ud, Mohd Zaki, Abdollah, Mohd Faizal
フォーマット: 論文
言語:English
出版事項: Asian Network for Scientefic Information 2012
主題:
オンライン・アクセス:http://eprints.utem.edu.my/id/eprint/15140/1/Effectiveness%20of%20security%20tools%20to%20anomalies%20on%20tunneled%20traffic187.pdf
http://eprints.utem.edu.my/id/eprint/15140/
https://docsdrive.com/pdfs/ansinet/itj/2012/191-199.pdf
タグ: タグ追加
タグなし, このレコードへの初めてのタグを付けませんか!
id my.utem.eprints.15140
record_format eprints
spelling my.utem.eprints.151402023-05-25T16:15:17Z http://eprints.utem.edu.my/id/eprint/15140/ Effectiveness of security tools to anomalies on tunneled traffic Bahaman, Nazrulazhar Prabuwono, Anton Satria Mas'ud, Mohd Zaki Abdollah, Mohd Faizal QA76 Computer software Tunneling mechanism has been proven as an option to link the communication between IPv6 networks and IPv4 environments without incurring the high costs of upgrading equipment. However, this mechanism has reduced the network performance and downgrade the level of security if compared to the native IPv6 network. The Transition Mechanism has also become a covert channel for spreading threats without being acknowledged by the network security tools. Even though the issue has been raised in the set of IETF rules, still they do not provide any recommendation to overcome the problem. Based on this reason, this study explored the effectiveness of conventional network security tools to detect any anomalies occurring on a tunneling mechanism especially against packet flooding attack in IPv6 tunneling. In order to achieve this objective, a testbed that has been deployed with conventional firewall and IDS is used to simulate the IPv6 to IPv4 tunneling mechanism, several network attacks are then launched and the network traffic is then captured to be analyzed. The result shows that the firewall with the default settings had blocked all the tunneling packets, while the firewall and IDS with the default rule of set had performed well in IPv4 but not in the IPv6 tunnel. Asian Network for Scientefic Information 2012 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/15140/1/Effectiveness%20of%20security%20tools%20to%20anomalies%20on%20tunneled%20traffic187.pdf Bahaman, Nazrulazhar and Prabuwono, Anton Satria and Mas'ud, Mohd Zaki and Abdollah, Mohd Faizal (2012) Effectiveness of security tools to anomalies on tunneled traffic. Information Technology Journal, 11 (2). pp. 191-199. ISSN 1812-5638 (Submitted) https://docsdrive.com/pdfs/ansinet/itj/2012/191-199.pdf 10.3923/itj.2012.191.199
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Bahaman, Nazrulazhar
Prabuwono, Anton Satria
Mas'ud, Mohd Zaki
Abdollah, Mohd Faizal
Effectiveness of security tools to anomalies on tunneled traffic
description Tunneling mechanism has been proven as an option to link the communication between IPv6 networks and IPv4 environments without incurring the high costs of upgrading equipment. However, this mechanism has reduced the network performance and downgrade the level of security if compared to the native IPv6 network. The Transition Mechanism has also become a covert channel for spreading threats without being acknowledged by the network security tools. Even though the issue has been raised in the set of IETF rules, still they do not provide any recommendation to overcome the problem. Based on this reason, this study explored the effectiveness of conventional network security tools to detect any anomalies occurring on a tunneling mechanism especially against packet flooding attack in IPv6 tunneling. In order to achieve this objective, a testbed that has been deployed with conventional firewall and IDS is used to simulate the IPv6 to IPv4 tunneling mechanism, several network attacks are then launched and the network traffic is then captured to be analyzed. The result shows that the firewall with the default settings had blocked all the tunneling packets, while the firewall and IDS with the default rule of set had performed well in IPv4 but not in the IPv6 tunnel.
format Article
author Bahaman, Nazrulazhar
Prabuwono, Anton Satria
Mas'ud, Mohd Zaki
Abdollah, Mohd Faizal
author_facet Bahaman, Nazrulazhar
Prabuwono, Anton Satria
Mas'ud, Mohd Zaki
Abdollah, Mohd Faizal
author_sort Bahaman, Nazrulazhar
title Effectiveness of security tools to anomalies on tunneled traffic
title_short Effectiveness of security tools to anomalies on tunneled traffic
title_full Effectiveness of security tools to anomalies on tunneled traffic
title_fullStr Effectiveness of security tools to anomalies on tunneled traffic
title_full_unstemmed Effectiveness of security tools to anomalies on tunneled traffic
title_sort effectiveness of security tools to anomalies on tunneled traffic
publisher Asian Network for Scientefic Information
publishDate 2012
url http://eprints.utem.edu.my/id/eprint/15140/1/Effectiveness%20of%20security%20tools%20to%20anomalies%20on%20tunneled%20traffic187.pdf
http://eprints.utem.edu.my/id/eprint/15140/
https://docsdrive.com/pdfs/ansinet/itj/2012/191-199.pdf
_version_ 1768012349977919488
score 13.251813