Detecting the Auto-configuration Attacks on IPv4 and IPv6 Networks

Search this article

Description

Auto-configuration is a mechanism, which assigns IP address, default gateway address and DNS server address to a node for accessing to the network. On IPv4 network, auto-configuration is done by using DHCP protocol, but IPv6 network has two ways to assign auto-configuration information to a node, which are stateless address configuration by routers and stateful address configuration by DHCPv6 servers. On the auto-configuration phrase, some attackers may be able to inject a counterfeit information, which may cause DOS, DNS hijacking, and man-in-the-middle attack, to the client. In this paper, we propose a method to detect DHCP attack and man-in-the-middle attack both on IPv4 and IPv6 network by collecting and analyzing the auto-configuration phrase. This approach is also able to detect the location of attacker in the network, and also works for both of IPv4 network and IPv6 network.

Journal

Details 詳細情報について

  • CRID
    1390853649760910080
  • NII Article ID
    120005620053
  • NII Book ID
    AA12222297
  • DOI
    10.15002/00011586
  • HANDLE
    10114/10903
  • ISSN
    18810667
  • Text Lang
    ja
  • Article Type
    departmental bulletin paper
  • Data Source
    • JaLC
    • IRDB
    • CiNii Articles
  • Abstract License Flag
    Allowed

Report a problem

Back to top