D 2017

Threats and Surprises behind IPv6 Extension Headers

HENDRIKS, Luuk; Petr VELAN; Ricardo DE O SCHMIDT; Pieter-Tjerk DE BOER; Aiko PRAS et al.

Základní údaje

Originální název

Threats and Surprises behind IPv6 Extension Headers

Autoři

HENDRIKS, Luuk; Petr VELAN; Ricardo DE O SCHMIDT; Pieter-Tjerk DE BOER a Aiko PRAS

Vydání

Dublin, Ireland, 2017 Network Traffic Measurement and Analysis Conference (TMA), od s. 1-9, 9 s. 2017

Nakladatel

IEEE Xplore Digital Library

Další údaje

Typ výsledku

Stať ve sborníku

Utajení

není předmětem státního či obchodního tajemství

Forma vydání

elektronická verze "online"

Označené pro přenos do RIV

Ne

Klíčová slova anglicky

Internet;Monitoring;Payloads;Probes;Protocols;Security;Standards

Příznaky

Mezinárodní význam, Recenzováno
Změněno: 24. 8. 2017 10:08, RNDr. Petr Velan, Ph.D.

Anotace

V originále

The concept of Extension Headers, newly introduced with IPv6, is elusive and enables new types of threats in the Internet. Simply dropping all traffic containing any Extension Header — a current practice by operators-seemingly is an effective solution, but at the cost of possibly dropping legitimate traffic as well. To determine whether threats indeed occur, and evaluate the actual nature of the traffic, measurement solutions need to be adapted. By implementing these specific parsing capabilities in flow exporters and performing measurements on two different production networks, we show it is feasible to quantify the metrics directly related to these threats, and thus allow for monitoring and detection. Analysing the traffic that is hidden behind Extension Headers, we find mostly benign traffic that directly affects end-user QoE: simply dropping all traffic containing Extension Headers is thus a bad practice with more consequences than operators might be aware of.

Přiložené soubory