Effectiveness of Security Tools to Anomalies on Tunneled Traffic

Nazrulazhar , Bahaman and Abdollah, M. F. and Mas'ud, M. Z. and Anton Satria, Prabuwono (2012) Effectiveness of Security Tools to Anomalies on Tunneled Traffic. Information Technology Journal. pp. 191-199. ISSN 1812-5638

[img] PDF
191-199.pdf - Published Version
Restricted to Registered users only

Download (628kB)

Abstract

Tunneling Mechanism has been proven as an option to link the communication between IPv6 network and IPv4 environment without incurring the high cost of upgrading equipment. However, this mechanism has reduced the network performance and downgrade the level of security if compared to the native IPV6 network. The Transition Mechanism has also become a covert channel for spreading threats without being acknowledged by the network security tools. Even though the issues have been raised in the set of IETF rules, still they do not provide any recommendation to overcome the problem. Based on this reason, this study explored the effectiveness of conventional network security tools to detect any anomalies occurring on a tunnelling mechanism especially against packet flooding attack in IPv6 tunneling. In order to achieve this objective, a testbed has been deployed with conventional firewall and IDS is used to simulated the IPv6 to IPv4 tunneling mechanism, several network attacks are then launched and the network traffic is then captured to be analysed. The result shows that the firewall with the default setting had blocked all the tunneling packet, while the firewall and IDS with the default rule of set had performed will in IPv4 but not in the IPv6 tunnel

Item Type: Article
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Faculty of Information and Communication Technology > Department of System and Computer Communication
Depositing User: Mohd Faizal Abdollah
Date Deposited: 25 Apr 2013 06:21
Last Modified: 28 May 2015 03:45
URI: http://eprints.utem.edu.my/id/eprint/6773
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item