Analyzing network-aware active wardens in IPv6

  • Authors:
  • Grzegorz Lewandowski;Norka B. Lucena;Steve J. Chapin

  • Affiliations:
  • Systems Assurance Institute, Syracuse University, Syracuse, NY;Systems Assurance Institute, Syracuse University, Syracuse, NY;Systems Assurance Institute, Syracuse University, Syracuse, NY

  • Venue:
  • IH'06 Proceedings of the 8th international conference on Information hiding
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

A crucial security practice is the elimination of network covert channels. Recent research in IPv6 discovered that there exist, at least, 22 different covert channels, suggesting the use of advanced active wardens as an appropriate countermeasure. The described covert channels are particularly harmful not only because of their potential to facilitate deployment of other attacks but also because of the increasing adoption of the protocol without a parallel deployment of corrective technology. We present a pioneer implementation of network-aware active wardens that eliminates the covert channels exploiting the Routing Header and the hop limit field as well as the well-known Short TTL Attack. Network-aware active wardens take advantage of network-topology information to detect and defeat covert protocol behavior. We show, by analyzing their performance over a controlled network environment, that the wardens eliminate a significant percentage of the covert channels and exploits with minimal impact over the end-to-end communications (approximately 3% increase in the packet roundtrip time).