Open Access Open Access  Restricted Access Subscription or Fee Access

A Framework of IPv6 Network Attack Dataset Construction by Using Testbed Environment


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v9i8.2869

Abstract


IPv6 has been implemented for quite a while. Nowadays, the number of IPv6 users has gradually increased. This is due to high demand of new IP addresses allocation which IPv4 cannot offer anymore. Theoretically, IPv6 protocol is much better than IPv4 in terms of security, mobility and routing speed. Although the design of the IPv6 technology has taken security concerns into its design, the implementation of IPv6 is not a panacea for the overall security issues. New threats have been discovered due to the flaws of the IPv6 new design. In IPv4, there is a dataset called KDD’ 99 dataset which widely used to propose a new detection technique in IPv4 environment. Many intrusion detection techniques were proposed by using the KDD’99 dataset. Unfortunately till this point of time there is no available dataset which similar to KDD’ 99 in IPv6 network environment. Hence, this paper is meant to propose a framework of constructing a dataset which similar to KDD’99 dataset based on IPv6 network environment. An example of IPv6 dataset construction is explained according to the proposed framework. A testbed based on the original KDD’ 99 framework is used as a baseline platform for this study. A framework of constructing IPv6 datasets is proposed which can be encouraged researchers to produce a solid dataset for IPv6 network environment. In the future, a new dataset can be produced which can facilitate further researcher in IPv6 security domain.
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


IPv6 Dataset; IDS

Full Text:

PDF


References


Atzori, L., A. Iera, and G. Morabito, The Internet of Things: A survey. Computer Networks, 2010. 54(15): p. 2787-2805.
http://dx.doi.org/10.1016/j.comnet.2010.05.010

Kuang, G., Zhang, H., The application research of IPv6 technology in the security architecture of the internet of things, (2013) International Review on Computers and Software (IRECOS), 8 (1), pp. 157-162.

Wang, L., J. Tao, M. Kunze, A.C. Castellanos, D. Kramer, and W. Karl. Scientific cloud computing: Early definition and experience. in High Performance Computing and Communications, 2008. HPCC'08. 10th IEEE International Conference on. 2008: Ieee.

Akyildiz, I.F., J. Xie, and S. Mohanty, A survey of mobility management in next-generation all-IP-based wireless systems. Wireless Communications, IEEE, 2004. 11(4): p. 16-28.
http://dx.doi.org/10.1109/MWC.2004.1325888

AbuAli, A.N., Shayeb, I.G., Batiha, K., Abu Aliudos, H.Y., The benefits of using internet protocol version 6 (IPv6), (2010) International Review on Computers and Software (IRECOS), 5 (6), pp. 583-587.

Waddington, D.G. and F. Chang, Realizing the transition to IPv6. IEEE Communications Magazine, 2002. 40(6): p. 138-147.
http://dx.doi.org/10.1109/MCOM.2002.1007420

Triulzi, A. Intrusion Detection Systems and IPv6. 2003 [cited 2013 19 Nov 2013]; 2007]. Available from: http://www.alchemistowl.org/arrigo/Papers/SPI2003-IDS-and-IPv6.pdf.

Xinyu, Y., M. Ting, and S. Yi. Typical DoS/DDoS Threats under IPv6. in Computing in the Global Information Technology, 2007. ICCGI 2007. International Multi-Conference on. 2007.

Avi, T., IPv6: new technology, new threats. Network Security, 2011(8): p. 13-15.

Zagar, D. and K. Grgic. IPv6 Security Threats and Possible Solutions. in Automation Congress, 2006. WAC '06. World. 2006.

Barker, K., The security implications of IPv6. Network Security, 2013. 2013(6): p. 5-9.
http://dx.doi.org/10.1016/S1353-4858(13)70068-0

Cerveny, B., A Milestone in IPv6 Deployment. 2012, Arbor SERT (Security Engineering & Response Team).

Bellovin, S.M., Perceptions and Reality. Security & Privacy, IEEE, 2010. 8(5): p. 88-88.
http://dx.doi.org/10.1109/MSP.2010.160

Zagar, D., K.i. Grgic, and S. Rimac-Drlje, Security aspects in IPv6 networks implementation and testing. Computers & Electrical Engineering, 2007. 33(5-6): p. 425-437.
http://dx.doi.org/10.1016/j.compeleceng.2007.05.008

Zulkiflee, M., M.A. Faizal, I.O. Mohd Fairuz, A. Nur Azman, and S. Shahrin, Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment. International Journal of Computer Science and Information Security (IJCSIS), 2011. 9(2).

Pochiraju, A., Time To Take IPv6 Thoughtfully, in Siliconindia. 2012, Siliconindia Inc. p. 38-39.

Bellovin, S.M., B. Cheswick, and A.D. Keromytis, Worm propagation strategies in an IPv6 Internet. LOGIN: The USENIX Magazine, 2006. 31(1): p. 70-76.

Lim, J.-D., Y.-H. Kim, B.-H. Jung, K.-Y. Kim, J.-N. Kim, and C.-H. Lee, Implementation of multi-thread based intrusion prevention system for IPv6. International Conference on Control, Automation and Systems, 2007. ICCAS'07., 2007: p. 404-407.

Ferdous, B., G. Bansal, N. Kumar, S. Biswas, and S. Nandi, Detection of neighbor discovery protocol based attacks in IPv6 network. Networking Science, 2013. 2(3-4): p. 91-113.
http://dx.doi.org/10.1007/s13119-013-0018-2

Yun, K. and M. Zhu Jian. Research of Hybrid Intrusion Detection and Prevention System for IPv6 Network. in Internet Technology and Applications (iTAP), 2011 International Conference on. 2011.
http://dx.doi.org/10.1109/itap.2011.6006397

Innella, P. The evolution of intrusion detection systems. 2001 [cited 2013 2 Aug 2013]; Available from: http://www.symantec.com/connect/articles/evolution-intrusion-detection-systems.

Allen, J., A. Christie, W. Fithen, J. McHugh, and J. Pickel. State of the practice of intrusion detection technologies. 2000 [cited 2013 13 Nov 2013]; Available from: http://www.sei.cmu.edu/reports/99tr028.pdf.

Debar, H., M. Dacier, and A. Wespi, A revised taxonomy for intrusion-detection systems. Annals of Telecommunications, 2000. 55(7): p. 361-378.

Axelsson, S., Intrusion detection systems: A survey and taxonomy. 2000, Technical report.

Amer, S.H. and J.A. Hamilton Jr, Intrusion Detection Systems (IDS) Taxonomy-A Short Review. Journal of Software Technology, 2010. 13(2).

Robiah, Y., S.S. Rahayu, M.M. Zaki, S. Shahrin, M.A. Faizal, and R. Marliza, A New Generic Taxonomy on Hybrid Malware Detection Technique. Arxiv preprint arXiv:0909.4860, 2009.

Wenke, L., S.J. Stolfo, and K.W. Mok. A data mining framework for building intrusion detection models. in Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on. 1999.

Hoque, M.S., M. Mukit, M. Bikas, and A. Naser, An implementation of intrusion detection system using Genetic Algorithm. arXiv preprint arXiv:1204.1336, 2012.

Toosi, A.N. and M. Kahani, A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Computer Communications, 2007. 30(10): p. 2201-2212.
http://dx.doi.org/10.1016/j.comcom.2007.05.002

Kayacik, H.G.n., A.N. Zincir-Heywood, and M.I. Heywood. Selecting features for intrusion detection: a feature relevance analysis on KDD 99 intrusion detection datasets. in Proceedings of the third annual conference on privacy, security and trust. 2005: Citeseer.

Lee, J.-H., J.-H. Lee, S.-G. Sohn, J.-H. Ryu, and T.-M. Chung. Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system. in Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on. 2008: IEEE.

Ektefa, M., S. Memar, F. Sidi, and L.S. Affendey. Intrusion detection using data mining techniques. in Information Retrieval & Knowledge Management,(CAMP), 2010 International Conference on. 2010: IEEE.

Haines, J.W., R.P. Lippmann, D. Fried, M.A. Zissman, E. Tran, and S.B. Boswell, 1999 DARPA Intrusion Detection Evaluation: Design and Procedures. 2001, Lincoln Laboratory, Massachusetts Institute of Technology.

Caida. Anonymized 2011 IPv6 Day Internet Traces. 2011 [cited 2012 10 Dec 2012]; Available from: https://data.caida.org/datasets/passive-2011-ipv6day/.

Tavallaee, M., E. Bagheri, W. Lu, and A.-A. Ghorbani. A detailed analysis of the KDD CUP 99 data set. in Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications 2009. 2009.
http://dx.doi.org/10.1109/CISDA.2009.5356528

Gont, F., ICMP attacks against TCP. 2010.

Davies, E., S. Krishnan, and P. Savola, IPv6 transition/co-existence security considerations. draft-ietf-v6ops-security-overview-06 (work in progress), 2006.

Jeong, J.P., IPv6 Host Configuration of DNS Server Information Approaches. 2006.

Nakibly, G. and F. Templin, Routing Loop Attack using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations. 2011, RFC 6324, August.

van Hauser, M. THC-IPv6. 2014 [cited 2014 17 July 2014]; Available from: https://www.thc.org/thc-ipv6/.

Lippmann, R., J.W. Haines, D.J. Fried, J. Korba, and K. Das, The 1999 DARPA off-line intrusion detection evaluation. Computer Networks, 2000. 34(4): p. 579-595.
http://dx.doi.org/10.1016/S1389-1286(00)00139-0

Zulkiflee, M., S.A. Azirah, N. Haniza, A. Zakiah, and S. Shahrin. Behavioral analysis on IPv4 malware on different platforms in IPv6 network environment. in IEEE International Conference Open Systems. 2011: IEEE.

W3Schools.com. OS Platform Statistic. 2011 [cited 2011 01 April]; Available from: http://www.w3schools.com/browsers/browsers_os.asp.

Labovitz, C. Six Months, Six Providers and IPv6. 2011 [cited 2012 20 Mac 2012]; Top IPv6 applications based on TCP / UDP port groups in six cooperating ATLAS providers].

Maruti, G. and S. Suresh, Greening of the internet, in Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. 2003, ACM: Karlsruhe, Germany.

Zhong, N., J. Dong, and S. Ohsuga, Using rough sets with heuristics for feature selection. Journal of intelligent information systems, 2001. 16(3): p. 199-214.
http://dx.doi.org/10.1023/A:1011219601502

Jensen, R. and Q. Shen, Fuzzy-rough sets assisted attribute selection. Fuzzy Systems, IEEE Transactions on, 2007. 15(1): p. 73-89.
http://dx.doi.org/10.1109/TFUZZ.2006.889761

Hall, M.A., Correlation-based feature selection for machine learning. 1999, The University of Waikato.

Chuang, L.-Y., H.-W. Chang, C.-J. Tu, and C.-H. Yang, Improved binary PSO for feature selection using gene expression data. Computational Biology and Chemistry, 2008. 32(1): p. 29-38.
http://dx.doi.org/10.1016/j.compbiolchem.2007.09.005


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize