Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

8/30/2013
12:04 AM
50%
50%

IPv6 To Complicate Threat-Intelligence Landscape

Reputation-based blacklists could face exponential growth when the number of possible Internet addresses becomes, for all practical purposes, infinite

A common type of Internet-based threat intelligence is the assigning of reputation scores to the source of traffic, usually expressed as a certain Internet address or domain.

Yet with the gradual -- some would say "glacial" -- move to the Internet Protocol Version 6 (IPv6) address scheme, the Internet's address space will grow from merely big to nearly infinite. The vastness of the address space will cause problems for many threat-intelligence firms, from allowing attackers to use a new address for every attack to causing a rapid expansion in the size of the database needed to track the data on various sources, says Tommy Stiansen, chief technology officer for Norse, a real-time threat intelligence provider.

"IPv6 makes the whole thing interesting because it's a lot bigger," Stiansen says. "Databases will have to be rearchitected to handle the increased data. For anyone in threat intelligence, that will be the biggest challenge to overcome."

A small, but still significant, part of the Internet has adopted IPv6. While the global rate of adoption is a mere 1.6 percent, according to statistics provided by Google, about 4 percent of networks in the United States have an end-to-end implementation of IPv6. Moreover, the fraction of networks that use IPv6 is growing exponentially.

While security researchers have already raised general concerns on the impact that the expansion of the Internet's address space will have on various security technologies and techniques, the impact on the services that collect data on attackers and their activities has not generally been studied. Because the Internet address of malicious traffic is often used as a proxy identifier for the attacker and as a way to turn intelligence into action -- blocking traffic from the offending IP address -- IPv4 addresses are often a key component of the first line of network defense.

[With IPv6, a deluge of new top-level domains, and DNSSEC all coming, the Internet will become a much bigger place, meaning that defenses that worked in the past won't work in the future. See Broader Digital Landscape Means More Places To Hide.]

For the current Internet addressing scheme, the model works fine, says Craig Sprosts, vice president of product management for domain-name system (DNS) firm Nominum.

"A lot of security technologies and intelligence vendors rely on an IPv4 address or range of addresses -- it tends to be a reasonably effective way of representing identity of the attacker," Sprosts says. "It is a very reliable indicator of where the attack is coming from for certain protocols."

Yet there will be no scarcity of IPv6 addresses, and so attacker may frequently change their assigned numbers, resulting in a potentially fast expansion of the IP address space that vendors deem to be suspicious. Threat intelligence systems that assign a reputation score to an Internet address will have to be rethought, says Brian Foster, chief technology officer for network-security firm Damballa. Managing the reputation of the 4.2 billion addresses available under IPv4 is possible, but doing it for the vast IPv6 address space is not, he says.

"With IPv6, that goes right out the window," Foster says. "A lot of the reputation systems that are simple blacklists and are signature-based are going to have to be rethought and redone."

Damballa has focused on creating algorithms that can generate reputation scores on the fly, lessening the need for large databases of scores.

The problems are not limited to the increase in data requirements needed to track malicious behavior. Attackers will also find ways to hide in IPv6 traffic that are not available to them in Internet protocol version 4. For example, using extension headers -- a feature of IPv6 designed to support additional functionality -- an attacker could include a payload disguised as a Web packet, for example, but, in reality, also includes attack code, says Jeremy Duncan, senior director and IPv6 network architect for Salient Federal Solutions.

"If I rewrite the code for malicious software to use the extension header, normal intrusion detection systems can't see those headers, and I've evaded defenses," he says.

Those problems, however, should eventually be resolved as companies figure out how to handle IPv6 traffic and make their products more IPv6 aware, Nominum's Sprosts says.

"Over time this risk will be mitigated, but I think over the next few years it will be a problem," he says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Can you smell me now?
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11844
PUBLISHED: 2020-05-29
There is an Incorrect Authorization vulnerability in Micro Focus Service Management Automation (SMA) product affecting version 2018.05 to 2020.02. The vulnerability could be exploited to provide unauthorized access to the Container Deployment Foundation.
CVE-2020-6937
PUBLISHED: 2020-05-29
A Denial of Service vulnerability in MuleSoft Mule CE/EE 3.8.x, 3.9.x, and 4.x released before April 7, 2020, could allow remote attackers to submit data which can lead to resource exhaustion.
CVE-2020-7648
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.72.2 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users who have access to Snyk's internal network by appending the URL with a fragment identifier and a whitelisted path e.g. `#package.json`
CVE-2020-7650
PUBLISHED: 2020-05-29
All versions of snyk-broker after 4.72.0 including and before 4.73.1 are vulnerable to Arbitrary File Read. It allows arbitrary file reads to users with access to Snyk's internal network of any files ending in the following extensions: yaml, yml or json.
CVE-2020-7654
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.73.1 are vulnerable to Information Exposure. It logs private keys if logging level is set to DEBUG.