Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29414

Select areas to restrict search in scientific publication database:
Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment
Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6) emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration. Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. In this paper, a proof of concept shall be presented in order to show that some existing IPv4 malware detection technique need to be improvised in order to detect malware attack in dual-stack network more efficiently. A testbed of dual-stack network environment has been deployed and some genuine malware have been released to observe their behaviors. The results between these different scenarios will be analyzed and discussed further in term of their behaviors and propagation methods. The results show that malware behave differently on IPv6 from the IPv4 network protocol on the dual-stack network environment. A new detection technique is called for in order to cater this problem in the near future.
Digital Object Identifier (DOI):


[1] Cheng, M. Research on network security based on IPv6 architecture. in Electronics and Optoelectronics (ICEOE), 2011 International Conference on. 2011.
[2] Waddington, D.G. and F. Chang, Realizing the transition to IPv6. IEEE Communications Magazine, 2002. 40(6): p. 138-147.
[3] Badamchizadeh, M.A. and A.A. Chianeh. Security in IPv6. Proceedings of the 5th WSEAS International Conference on Signal Processing. 2006. Istanbul, Turkey.
[4] Zheng, Q., T. Liu, X. Guan, Y. Qu, and N. Wang, A new worm exploiting IPv4-IPv6 dual-stack networks, in Proceedings of the 2007 ACM workshop on Recurring malcode. 2007, ACM: Alexandria, Virginia, USA.
[5] Kamra, A., H. Feng, V. Misra, and A.D. Keromytis. The effect of DNS delays on worm propagation in an IPv6 Internet. in INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE. 2005.
[6] Bellovin, S.M., B. Cheswick, and A.D. Keromytis, Worm propagation strategies in an IPv6 Internet. LOGIN: The USENIX Magazine, 2006. 31(1): p. 70-76.
[7] Computer Economics, Annual Worldwide Economic Damages from Malware Exceed $13 Billion. 2007.
[8] Bellovin, S.M., Perceptions and Reality. Security & Privacy, IEEE, 2010. 8(5): p. 88-88.
[9] Stewart, J., Behavioural malware analysis using sandnets. Computer Fraud & Security, 2006. 2006(12): p. 4-6.
[10] Jiann-Liang, C., C. Yao-Chung, and L. Chien-Hsiu. Performance investigation of IPv4/IPv6 transition mechanisms. in Advanced Communication Technology, 2004. The 6th International Conference on. 2004.
[11] Karresand, M., A proposed taxonomy of software weapons. No. FOI, 2002.
[12] Robiah, Y., S.S. Rahayu, M.M. Zaki, S. Shahrin, M.A. Faizal, and R. Marliza, A New Generic Taxonomy on Hybrid Malware Detection Technique. Arxiv preprint arXiv:0909.4860, 2009.
[13] Zulkiflee, M., M.A. Faizal, I.O. Mohd Fairuz, A. Nur Azman, and S. Shahrin, Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment. International Journal of Computer Science and Information Security (IJCSIS), 2011. 9(2).
[14] Chen, Z. and C. Ji, An information-theoretic view of network-aware malware attacks. 2008.
[15] Cliff, C.Z., T. Don, G. Weibo, and C. Songlin, Advanced Routing Worm and Its Security Challenges. Simulation, 2006. 82(1): p. 75-85.
[16] Zesheng, C. and J. Chuanyi, Optimal worm scanning method using vulnerable host distributions. International Journal Security Network, 2007. 2(1/2): p. 71-80.
[17] McHugh, J., Intrusion and intrusion detection. International Journal of Information Security, 2001. 1(1): p. 14-35.
[18] Sangkatsanee, P., N. Wattanapongsakorn, and C. Charnsripinyo, Practical real-time intrusion detection using machine learning approaches. Computer Communications, 2011. 34(18): p. 2227-2235.
[19] Antonis, P., P. Michalis, and P.M. Evangelos, Improving the accuracy of network intrusion detection systems under load using selective packet discarding, in Proceedings of the Third European Workshop on System Security. 2010, ACM: Paris, France.
[20] Li, Z., Y. Gao, and Y. Chen, HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency. Computer Networks, 2009. 54(8): p. 1282-1299.
[21] Mohd Faizal, A., Enhanced Fast Attack Detection Technique For Network Intrusion Detection System. 2009, Phd Thesis at Universiti Teknikal Malaysia Melaka (UTeM).
[22] Labib, K. and R. Vemuri, NSOM: A Real-Time Network-Based Intrusion Detection System Using Self-Organizing Maps. Networks and Security, 2002.
[23] Su, F., Z.-w. Lin, and Y. Ma, Modeling and analysis of Internet worm propagation. The Journal of China Universities of Posts and Telecommunications, 2010. 17(4): p. 63-68.
[24] Okamura, H., H. Kobayashi, and T. Dohi. Markovian modeling and analysis of Internet worm propagation. in Software Reliability Engineering, 2005. ISSRE 2005. 16th IEEE International Symposium on. 2005.
[25] Ting, L., G. Xiaohong, Z. Qinghua, and Q. Yu, A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks: experiment, modeling, simulation, and defense. Network, IEEE, 2009. 23(5): p. 22-29.
[26] Zagar, D., K.i. Grgic, and S. Rimac-Drlje, Security aspects in IPv6 networks implementation and testing. Computers & Electrical Engineering, 2007. 33(5-6): p. 425-437.
[27] Bruce J, N., An introduction to investigating IPv6 networks. Digital Investigation, 2007. 4(2): p. 59-67.
[28] Qiao, P. and P. Changxing, Distributed sampling measurement method of network traffic in high-speed IPv6 networks. Journal of Systems Engineering and Electronics, 2007. 18(4): p. 835-840.
[29] Caida. Anonymized 2011 IPv6 Day Internet Traces. 2011
[cited; Available from:
[30] Zolkipli, M.F. and A. Jantan. Malware Behavior Analysis: Learning and Understanding Current Malware Threats. in Network Applications Protocols and Services (NETAPPS), 2010 Second International Conference on. 2010.
[31] Rahayu, S.S., Y. Robiah, S. Shahrin, M.M. Zaki, M.A. Faizal, and Z.A. Zaheera, Advanced Trace Pattern For Computer Intrusion Discovery. Arxiv preprint arXiv:1006.4569, 2010.
[32] Robiah, Y., S.S. Rahayu, S. Sahib, M.M. Zaki, M.A. Faizal, and R. Marliza. An improved traditional worm attack pattern. in Information Technology (ITSim), 2010 International Symposium in. 2010.
[33] Liu, T., X. Guan, Q. Zheng, and Y. Qu, A New Worm Exploiting IPv6 and IPv4-IPv6 Dual-Stack Networks: Experiment, Modeling, Simulation and Defense. 2009, IEEE Network.
Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007