23
Adopting Innovative Detection Technique To Detect ICMPv6 Based Vulnerability Attacks Navaneethan C. Arjuman [email protected] .my National Advanced IPv6 Centre January 2014 1 Copyright Nava 2012

Adopting Innovative Detection Technique To Detect ICMPv6 Based

  • Upload
    vanngoc

  • View
    237

  • Download
    2

Embed Size (px)

Citation preview

Page 1: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Adopting Innovative Detection Technique To Detect ICMPv6

Based Vulnerability Attacks

Navaneethan C. Arjuman [email protected] .my National Advanced IPv6 Centre January 2014

1 Copyright Nava 2012

Page 2: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Introduction �  IPv6 was introduced to overcome the exhaustion of IPv4

address �  IPv6 has a lot of advantages compare to IPv4 �  IPv6 also has similar and new security threats as

compare to IPv4 �  IPv6 Network is no longer exist if ICMPv6 are blocked

or dropped in contrast with ICMP packets blocking and dropping as of in the IPv4 network

�  Internet Control Message Protocol for IPv6 (ICMPv6) based attacks would be one of the key known security threats for both the Dual Stack and IPv6 Native networks

2 Copyright Nava 2012

Page 3: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Problem Statement �  ICMPv6 has bigger role in IPv6 networks

compare to ICMPv4 in IPV4 networks ◦  Role of ARP protocol in IPv4 has already absorbed

under ICMPv6 under IPv6 networks

�  Similar to ICMPv4, ICMPv6 also has weakness that will be exploited by attackers to attack the network

�  Managing ICMPv6 issues under dual stack and native IPv6 would more complex compare just pure IPv4 networks

3 Copyright Nava 2012

Page 4: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Problem Statement �  The existing ICMPv4 solution no longer

sufficient to detect ICMPv6 attacks �  Modified and New Approaches required to

address ICMPv6 exploitation

4 Copyright Nava 2012

Page 5: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Objectives

�  To investigate and study the weakness of ICMPv6 protocols

�  To analyse the ICMPv6 traffics with various attack scenarios

�  To propose new algorithm to detect ICMPv6 attacks

�  To test and evaluate the proposed algorithm

5 Copyright Nava 2012

Page 6: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Known ICMPv4 Attacks Below are known ICMPv4 Attacks that also can be present in ICMPv6 �  ICMP Sweep �  Inverse mapping �  Trace Route network mapping �  OS fingerprinting �  ICMP route re-direct �  Ping of Death �  ICMP Smurf attack �  ICMP Nuke attack �  Attack using source quench

6 Copyright Nava 2012

Page 7: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Key ICMPv4 Type and Code that contributes the attacks in

IPv4 network A"acks  on  ICMP  Protocol   Significant  Parameters    ICMP  Sweep    

 Type=8  and  code=0  

Inverse  mapping   Type=0  without  sending  type=8  Traceroute  network  mapping     TTL=0  and  type=8  OS  fingerprinAng   Type=8  and  code  other  than  0  ICMP  route  redirect   Type=5  Ping  of  death   Total   size   of   IP   packet   >65535  

bytes  

ICMP  Smurf  aJack   Type=0    without  sending  type=8  ICMP  Nuke  aJack   Invalid  packet    AJack  using  source  quench  

 Type=4  and  code=0  

7

Atul Kant Kaushik and R C Joshi, International Journal of Computer Application (0975-8887) Volume 2 – N0. , May 2010

Page 8: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Focusing on ICMPv6 Attacks There are many ICMPv6 attacks, the common attacks are �  Man in the Middle (MITM) �  Denial of Services

8 Copyright Nava 2012

Page 9: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Man in the Middle Attacks �  Sniffing and session hijacking �  IPv4 ◦  ARP cache poisoning ◦  DHCP spoofing

�  IPv6 ◦  ARP replaced by ICMPv6 neighbor discovery process ◦  DHCP may be replaced by the alternative process

called stateless auto-configuration

9 Copyright Nava 2012

Page 10: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Man in the Middle Attacks MITM some known techniques �  Man in the middle with spoofed ICMPv6 neighbor

advertisement. �  Man in the middle with spoofed ICMPv6 router

advertisement. �  Man in the middle using ICMPv6 redirect or ICMPv6

too big to implant route. �  Man in the middle to attack mobile IPv6 but requires

ipsec to be disabled. �  Man in the middle with rogue DHCPv6 Server

10 Copyright Nava 2012

Page 11: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Man in the Middle Attacks MITM some known techniques �  Man in the middle with spoofed ICMPv6 neighbor

advertisement. �  Man in the middle with spoofed ICMPv6 router

advertisement. �  Man in the middle using ICMPv6 redirect or ICMPv6

too big to implant route. �  Man in the middle to attack mobile IPv6 but requires

ipsec to be disabled. �  Man in the middle with rogue DHCPv6 Server

11 Copyright Nava 2012

Page 12: Adopting Innovative Detection Technique To Detect ICMPv6 Based

MITM With Spoofed ICMPv6 Neighbor Advertisement

12 Copyright Nava 2012

ICMPv6 neighbor discovery requires two types of ICMPv6 •  ICMPv6 Neighbor solicitation (ICMPv6 Type 135) •  ICMPv6 neighbor advertisement (ICMPv6 type 136).

Page 13: Adopting Innovative Detection Technique To Detect ICMPv6 Based

MITM With Spoofed ICMPv6 Neighbor Advertisement

13 Copyright Nava 2012

Page 14: Adopting Innovative Detection Technique To Detect ICMPv6 Based

MITM With Spoofed ICMPv6 Router Advertisement

14 Copyright Nava 2012

Page 15: Adopting Innovative Detection Technique To Detect ICMPv6 Based

MITM With Spoofed ICMPv6 Router Advertisement

15 Copyright Nava 2012

Page 16: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Denial of Services �  Traffic flooding with ICMPv6 router

advertisement, neighbor advertisement, neighbor solicitation, multicast listener discovery, or smurf

attack. �  Denial of Service which prevents new IPv6

attack on the network. �  Denial of Service which is related to

fragmentation. �  Traffic flooding with ICMPv6 neighbor

solicitation and a lot of crypto stuff to make CPU target busy.

16 Copyright Nava 2012

Page 17: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Smurf Attack

17 Copyright Nava 2012

Page 18: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Duplicate Address Detection (DAD)

18 Copyright Nava 2012

Page 19: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Duplicate Address Detection (DAD)

19 Copyright Nava 2012

Page 20: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Methodology Proposed to develop ICMPv6 Based Vulnerability Attack Detection System’s that has the following sub approaches �  ICMPv6 Traffic Reduction Technique ◦  To collect all the ICMPv6 packets with specific type

and code that contributes for known ICMPv6 attacks

20 Copyright Nava 2012

Page 21: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Methodology �  ICMPv6 Statistical Aggregation Technique ◦  Aggregating and classifying the filtered ICMPv6 traffics

based on significant parameters

�  Ruled Based Severity Alert ◦  Ruled based severity alert technique involves

correlating the aggregated traffic with particular ICMPv6 based attacks and also provide indication of the severity level

21 Copyright Nava 2012

Page 22: Adopting Innovative Detection Technique To Detect ICMPv6 Based

Sample capture of iNetmon ICMP Fault Monitoring Module

22 Copyright Nava 2012

Page 23: Adopting Innovative Detection Technique To Detect ICMPv6 Based

23

Thank You

Copyright Nava 2012