Visible to the public Development of a suite of IPv6 vulnerability scanning tests using the TTCN-3 language

TitleDevelopment of a suite of IPv6 vulnerability scanning tests using the TTCN-3 language
Publication TypeConference Paper
Year of Publication2018
AuthorsLeal, A. G., Teixeira, Í C.
Conference Name2018 International Symposium on Networks, Computers and Communications (ISNCC)
ISBN Number978-1-5386-3779-1
KeywordsAddress autoconfiguration, application security, attacks simulation, compositionality, Computer crime, denial of service, denial-of-service attack detection, Device Security, dual-stack networks, Duplicate Address Detection, formal specification, Human Behavior, ICMPv6 Protocol, Internet, IP networks, IPv4 IPv6 protocol, IPv6, IPv6 networks, IPv6 vulnerability scanning tests, Linux, Metrics, network communications, passive analysis, program testing, Protocols, Prototypes, pubcrawl, Resiliency, security of data, specification languages, telecommunication computing, telecommunication security, test extensibility, test maintainability, test specification language, Testing, Testing and Test Control Notation version 3, transport protocols, TTCN-3, TTCN-3 language, vulnerability assessment, vulnerability detection, Vulnerability Management, vulnerability scanning
Abstract

With the transition from IPv4 IPv6 protocol to improve network communications, there are concerns about devices and applications' security that must be dealt at the beginning of implementation or during its lifecycle. Automate the vulnerability assessment process reduces management overhead, enabling better management of risks and control of the vulnerabilities. Consequently, it reduces the effort needed for each test and it allows the increase of the frequency of application, improving time management to perform all the other complicated tasks necessary to support a secure network. There are several researchers involved in tests of vulnerability in IPv6 networks, exploiting addressing mechanisms, extension headers, fragmentation, tunnelling or dual-stack networks (using both IPv4 and IPv6 at the same time). Most existing tools use the programming languages C, Java, and Python instead of a language designed specifically to create a suite of tests, which reduces maintainability and extensibility of the tests. This paper presents a solution for IPv6 vulnerabilities scan tests, based on attack simulations, combining passive analysis (observing the manifestation of behaviours of the system under test) and an active one (stimulating the system to become symptomatic). Also, it describes a prototype that simulates and detects denial-of-service attacks on the ICMPv6 Protocol from IPv6. Also, a detailed report is created with the identified vulnerability and the possible existing solutions to mitigate such a gap, thus assisting the process of vulnerability management.

URLhttps://ieeexplore.ieee.org/document/8530888
DOI10.1109/ISNCC.2018.8530888
Citation Keyleal_development_2018