Prevention of MITM attack caused by rogue router advertisements in IPv6

dc.contributor.authorOuseph, C.
dc.contributor.authorChandavarkar, B.R.
dc.date.accessioned2026-02-06T06:38:52Z
dc.date.issued2017
dc.description.abstractRouter discovery in IPv6 is vulnerable to rogue Router Advertisements (RAs), wherein unintended and possibly incorrect RAs make their way into the network. An IPv6 host obtains several important information from an RA like the default router's address and the prefix for autoconfiguring its IPv6 address. Incorrect data in the RA fields result in operational problems in the network. This can occur as a result of misconfigurations or malicious intentions. A variation of this security threat occurs in the form of a node sending a rogue RA with the spoofed address of the legit router but with the router lifetime field set to zero. This causes the legit router to be removed as the default router for hosts on the subnet. Further, the malicious node could advertise itself as the default router and essentially perform a man-in-The-middle (MITM) attack. This paper demonstrates such a possibility on an IPv6 testbed and presents a possible solution to prevent the same. The implementation of the solution is done on the Linux kernel and results testifying the solution are presented. © 2016 IEEE.
dc.identifier.citation2016 IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2016 - Proceedings, 2017, Vol., , p. 952-956
dc.identifier.urihttps://doi.org/10.1109/RTEICT.2016.7807969
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/31928
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.subjectIcmpv6
dc.subjectIPv6
dc.subjectNeighbor discovery
dc.subjectNetwork security
dc.titlePrevention of MITM attack caused by rogue router advertisements in IPv6

Files