When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks

Cited 9 time in webofscience Cited 0 time in scopus
  • Hit : 438
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorHong, Hyunwookko
dc.contributor.authorChoi, Hyunwooko
dc.contributor.authorKim, Dongkwanko
dc.contributor.authorKim, Hongilko
dc.contributor.authorHong, Byeongdoko
dc.contributor.authorNoh, Jiseongko
dc.contributor.authorKim, Yongdaeko
dc.date.accessioned2017-07-04T02:35:47Z-
dc.date.available2017-07-04T02:35:47Z-
dc.date.created2017-06-29-
dc.date.created2017-06-29-
dc.date.created2017-06-29-
dc.date.created2017-06-29-
dc.date.issued2017-04-02-
dc.identifier.citation2nd IEEE European Symposium on Security and Privacy (EuroS&P), pp.595-
dc.identifier.urihttp://hdl.handle.net/10203/224650-
dc.description.abstractRecently, cellular operators have started migrating to IPv6 in response to the increasing demand for IP addresses. With the introduction of IPv6, cellular middleboxes, such as firewalls for preventing malicious traffic from the Internet and stateful NAT64 boxes for providing backward compatibility with legacy IPv4 services, have become crucial to maintain stability of cellular networks. This paper presents security problems of the currently deployed IPv6 middleboxes of five major operators. To this end, we first investigate several key features of the current IPv6 deployment that can harm the safety of a cellular network as well as its customers. These features combined with the currently deployed IPv6 middlebox allow an adversary to launch six different attacks. First, firewalls in IPv6 cellular networks fail to block incoming packets properly. Thus, an adversary could fingerprint cellular devices with scanning, and further, she could launch denial-of-service or over-billing attacks. Second, vulnerabilities in the stateful NAT64 box, a middlebox that maps an IPv6 address to an IPv4 address (and vice versa), allow an adversary to launch three different attacks: 1) NAT overflow attack that allows an adversary to overflow the NAT resources, 2) NAT wiping attack that removes active NAT mappings by exploiting the lack of TCP sequence number verification of firewalls, and 3) NAT bricking attack that targets services adopting IP-based blacklisting by preventing the shared external IPv4 address from accessing the service. We confirmed the feasibility of these attacks with an empirical analysis. We also propose effective countermeasures for each attack.-
dc.languageEnglish-
dc.publisherIEEE-
dc.titleWhen Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks-
dc.typeConference-
dc.identifier.wosid000424197300039-
dc.identifier.scopusid2-s2.0-85026655993-
dc.type.rimsCONF-
dc.citation.beginningpage595-
dc.citation.publicationname2nd IEEE European Symposium on Security and Privacy (EuroS&P)-
dc.identifier.conferencecountryFR-
dc.identifier.conferencelocationUPMC Campus Jussieu, Paris-
dc.identifier.doi10.1109/EuroSP.2017.34-
dc.contributor.localauthorKim, Yongdae-
Appears in Collection
EE-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 9 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0