IPv6 approach for TCP SYN Flood attack over VoIP, Part IV

    Date11 Jan 2006
    CategoryFeatures
    23574
    Posted ByBenjamin D. Thomas
    Service Providers are scrambling to offer voice, video, data and innovative services such as gaming, interactive TV and messaging, on a single pipe. At the same time, network equipment is being upgraded to IPV6.But some Real-Time IPV6 Security overwhelms performance due to the application intelligence which is the rapid inspection of VoIP signaling SIP, H.323 and audio packets, and the prompt opening and shutting of "pinholes" to allow the passage of valid voice traffic over wireless networks.

    A firewall enabled for application filtering and IPv6 can drop application performance by a staggering 90 % or more compared to best case IPV4 results.

    Given methods are used to IPv6 Application performance:

    • Emulate real application traffic -data, voice, video over tens of thousands of clients and/or servers.
    • Measure performance and Quality of Experience with Web pages/s, VoIP call set-up time, FTP file transfer rate and instant message passing with TCP SYN handshaking signals.

    Multiply services over IPv4/v6 must address three additional challenges that will impact network performance must be handled following DoS attacks. IPv6 approaches can handle these with Network tester configurations.

    6.2 DoS Attacks

    • Must be filtered, including traditional layer 3-4 attacks such as TCP SYN Flood which is ported to IPv6.
    • ICMPv6 attacks
    • Application layer attacks (such as SIP setup/teardown flood and RTP stream Insertion).
    • Application attacks are particularly effective because they degrade the CPU performance.

    6.3 VoIP Attack Vulnerability

    VoIP attack vulnerability simulates DoS attacks to measure impact on VoIP with:

    • Traditional DoS attacks (TCP SYN flood, ping of Death)
    • VoIP voice insertion-simulate rogue RTP streams.
    • VoIP DoS simulates bursts of call setups and teardowns on the same addresses

    6.4 Performance Challenges

    6.4.1
    Longer IPv6 addresses:

    Firewall rule sets and ACL must work IPv6 addresses. It can degrade performance.

    6.4.2
    IPv6 variable-length headers:

    Parsing more complex encryption and authentication header sections must be parsed and filtered and it may also need to perform encryption/decryption or calculation of message authentication codes to be filter on application-layer headers and content.

    6.4.3
    IPv6 DoS attacks

    IPv6/v4 and IPv4/v6 tunneling can hide application-layer attacks within complex handcrafted TCP SYN packets.

    6.5 Triple-Play Methodology

    It is a new approach needed to ensure that application aware devices do not become bottlenecks:

    6.5.1
    Real-Time Application Performance.

    6.5.2
    Add DoS attacks over IPv6 including SIP setup-teardown attacks. Quantify the reduction in application performance.

    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"39","type":"x","order":"1","pct":50.65,"resources":[]},{"id":"88","title":"Should be more technical","votes":"11","type":"x","order":"2","pct":14.29,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"27","type":"x","order":"3","pct":35.06,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.