This paper surveys the five most important technologies for IPv4aaS (IPv4-as-a-Service), namely 464XLAT, DS-Lite (Dual-Stack Lite), lw4o6 (Lightweight 4over6), MAP-E and MAP-T. The aim of our effort is to identify the potential security issues within these technologies. We plan to perform their security analysis following the STRIDE approach, which stands for spoofing, tampering, repudiation, information disclosure, denial of service and elevation of privilege. We give a short introduction for the method. Within the five IPv4aaS technologies, we focus on 464XLAT, its architecture and operation. We construct a DFD diagram suitable for its security analysis according to the STRIDE methodology, thus making the first steps towards finding its potential vulnerabilities and seeking for their mitigations.
This paper focuses on one of the most prominent IPv6 transition technologies named 464XLAT. The aim is to analyze the security threats that this technology might face. After carrying out the threat analysis using STRIDE method that stands for Spoofing, Tampering, Repudiation, Information Disclosure and Elevation of Privilege, and using DFD (Data-Flow Diagram) as a core for the analysis, we summarized the security vulnerabilities and attack points possibilities within this infrastructure. We have also built a testbed for 464XLAT topology using several virtual machines, which were created using Debian image. We used our testbed to perform DoS (Denial of Service) attack against the PLAT (provider-side translator) and monitor PLAT’s performance and the number of packets being translated under attack by different number of clients using the hping3 command.
This paper focuses on one of the most prominent IPv6 transition technologies named DS-Lite (Dual Stack Lite). The aim is to analyze the security threats that this technology might be vulnerable to. The analysis is based on the STRIDE method that stands for Spoofing, Tampering, Repudiation, Information disclosure and Elevation of privilege. Using the DFD (Data Flow Diagram) of a DS-Lite system, we summarized the potential security vulnerabilities and potential attack points within this infrastructure. We have also built a testbed for DS-Lite topology using several virtual machines, which were created using CentOS Linux images. We used our testbed to perform MitM (Man in the Middle) attack and other type of attacks against the B4 (border gateway) and the AFTR (Address Family Transition Router) and then to monitor their performance and the number of packets being translated under attack by different number of clients using several attacking toolkits.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.