Lin Bin, Zhang Liancheng, Zhang Hongtao, Guo Yi, Ge Shaowei, Fang Yakai, Ren Mingyue
School of Cyber Science and Engineering, Zhengzhou University, Zhengzhou, 450001, China.
National Digital Switching System Engineering and Technological Research Center, Zhengzhou, 450002, China.
Sci Rep. 2024 Apr 25;14(1):9534. doi: 10.1038/s41598-024-59913-8.
The IPv6 extension header mechanism, a new feature of the IPv6 protocol, enhances flexibility and scalability but introduces numerous security threats like firewall evasion and covert channels. Existing threat detection methods face limitations in detection types, universality, and speed. Hence, an adaptive detection model for IPv6 extension header threats (ADM-DDA6) is proposed. Firstly, standard rule sets are designed for common IPv6 extension headers, successfully detecting 70 types of threats from THC-IPv6 and ExtHdr tools using only 20 rules. Secondly, by parsing IPv6 extension headers, matching rules, establishing transition relationships, and deciding packet threat status based on final states (Normal or Abnormal), complex threats like header disorder and header repetition can be detected. Finally, an adaptive rule matching method is introduced, which dynamically selects rule sets based on IPv6 extension header types, effectively reducing rule matching time. Experimental results show that under different threat magnitudes, ADM-DDA6 is 32% faster than Suricata v6.0.12 and 21.2% faster than Snort v3.1.61.0 in detection speed. Additionally, as the number of threats increases, on commodity hardware, ADM-DDA6 incurs only a 0.7% increase in CPU overhead with no significant memory consumption increase, maintains maximum throughput, and exhibits minor performance changes under low and moderate network load conditions.
IPv6扩展报头机制是IPv6协议的一项新特性,它增强了灵活性和可扩展性,但也带来了诸如防火墙规避和隐蔽通道等众多安全威胁。现有的威胁检测方法在检测类型、通用性和速度方面存在局限性。因此,提出了一种针对IPv6扩展报头威胁的自适应检测模型(ADM-DDA6)。首先,为常见的IPv6扩展报头设计标准规则集,仅使用20条规则就能成功检测出THC-IPv6和ExtHdr工具中的70种威胁类型。其次,通过解析IPv6扩展报头、匹配规则、建立转换关系并根据最终状态(正常或异常)确定数据包威胁状态,可以检测出头无序和头重复等复杂威胁。最后,引入了一种自适应规则匹配方法,该方法根据IPv6扩展报头类型动态选择规则集,有效减少了规则匹配时间。实验结果表明,在不同威胁程度下,ADM-DDA6的检测速度比Suricata v6.0.12快32%,比Snort v3.1.61.0快21.2%。此外,随着威胁数量的增加,在商用硬件上,ADM-DDA6的CPU开销仅增加0.7%,内存消耗无显著增加,保持了最大吞吐量,并且在低和中等网络负载条件下性能变化较小。