Linux Security
Linux Security
Linux Security

IPv6 approach for TCP SYN Flood attack over VoIP, Part IV

Date 11 Jan 2006
Posted By Benjamin D. Thomas
Service Providers are scrambling to offer voice, video, data and innovative services such as gaming, interactive TV and messaging, on a single pipe. At the same time, network equipment is being upgraded to IPV6.But some Real-Time IPV6 Security overwhelms performance due to the application intelligence which is the rapid inspection of VoIP signaling SIP, H.323 and audio packets, and the prompt opening and shutting of "pinholes" to allow the passage of valid voice traffic over wireless networks.

A firewall enabled for application filtering and IPv6 can drop application performance by a staggering 90 % or more compared to best case IPV4 results.

Given methods are used to IPv6 Application performance:

  • Emulate real application traffic -data, voice, video over tens of thousands of clients and/or servers.
  • Measure performance and Quality of Experience with Web pages/s, VoIP call set-up time, FTP file transfer rate and instant message passing with TCP SYN handshaking signals.

Multiply services over IPv4/v6 must address three additional challenges that will impact network performance must be handled following DoS attacks. IPv6 approaches can handle these with Network tester configurations.

6.2 DoS Attacks

  • Must be filtered, including traditional layer 3-4 attacks such as TCP SYN Flood which is ported to IPv6.
  • ICMPv6 attacks
  • Application layer attacks (such as SIP setup/teardown flood and RTP stream Insertion).
  • Application attacks are particularly effective because they degrade the CPU performance.

6.3 VoIP Attack Vulnerability

VoIP attack vulnerability simulates DoS attacks to measure impact on VoIP with:

  • Traditional DoS attacks (TCP SYN flood, ping of Death)
  • VoIP voice insertion-simulate rogue RTP streams.
  • VoIP DoS simulates bursts of call setups and teardowns on the same addresses

6.4 Performance Challenges

Longer IPv6 addresses:

Firewall rule sets and ACL must work IPv6 addresses. It can degrade performance.

IPv6 variable-length headers:

Parsing more complex encryption and authentication header sections must be parsed and filtered and it may also need to perform encryption/decryption or calculation of message authentication codes to be filter on application-layer headers and content.

IPv6 DoS attacks

IPv6/v4 and IPv4/v6 tunneling can hide application-layer attacks within complex handcrafted TCP SYN packets.

6.5 Triple-Play Methodology

It is a new approach needed to ensure that application aware devices do not become bottlenecks:

Real-Time Application Performance.

Add DoS attacks over IPv6 including SIP setup-teardown attacks. Quantify the reduction in application performance.


LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"42","type":"x","order":"1","pct":84,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"4","type":"x","order":"2","pct":8,"resources":[]},{"id":"181","title":"Hardly ever","votes":"4","type":"x","order":"3","pct":8,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.