IPv6 Security
35 Followers
Recent papers in IPv6 Security
IPv6 adds many improvements to IPv4 in areas such as address space, built-in security, quality of service, routing and network auto-configuration. IPv6 nodes use the Neighbor Discovery (ND) protocol to discover other nodes on the link, to... more
IPv6 adds many improvements to IPv4 in areas such as address space, built-in security, quality of service, routing and network auto-configuration. IPv6 nodes use the Neighbor Discovery (ND) protocol to discover other nodes on the link, to determine their link-layer addresses, to find routers, to detect duplicate address, and to maintain reachability information about the paths to active neighbors. ND is vulnerable to various attacks when it is not secured. The original specifications of ND called for the use of IPsec as a security mechanism to protect ND messages. However, its use is impractical due to the very large number of manually configured security associations needed for protecting ND. For this reason, the Secure Neighbor Discovery Protocol (SEND) was proposed. In this work, we present Easy-SEND, an open source implementation of SEND that can be used in production environment or as a didactic application for the teaching and learning of the SEND protocol. Easy-SEND is easy to install and use, and it has an event logger that can help network administrators to troubleshoot problems or students in their studies. It also includes a tool to generate and verify Cryptographically Generated Addresses (CGA) that are used with SEND.
- by Say Chiu and +1
- •
- Teaching and Learning, IPv6, Open Source, IPv6 Security
Migration from IPv4 to IPv6 is still visibly slow, mainly because of the inherent cost involved in the implementation, hardware and software acquisition. However, there are many values IPv6 can bring to the IP enabled environment as... more
Migration from IPv4 to IPv6 is still visibly slow, mainly because of the inherent cost involved in the implementation, hardware and software acquisition. However, there are many values IPv6 can bring to the IP enabled environment as compared to IPv4, particularly for Voice Over Internet Protocol (VoIP) solutions. Many companies are drifting away from circuit based switching such as PSTN to packet based switching (VoIP) for collaboration. There are several factors determining the effective utilization and quality of VoIP solutions. These include the choice of codec, echo control, packet loss, delay, delay variation (jitter), and the network topology. The network is basically the environment in which VoIP is deployed. State of art network design for VoIP technologies requires impeccable Interior Gateway routing protocols that will reduce the convergence time of the network, in the event of a link failure. Choice of CODEC is also a main factor. Since most research work in this area did not consider a particular CODEC as a factor in determining performance, this paper will compare the behaviour of RIP and OSPF in IPv4 and IPv6 using G.711 CODEC with riverbed modeller17.5.
This document addresses numerous security problems which DHCPv6 could be a victim of. We believe DHCPv6 will be the configuration method of choice. Despite of this fact, we think we have to describe a number of security issues one must be... more
This document addresses numerous security problems which DHCPv6 could be a victim of. We believe DHCPv6 will be the configuration method of choice. Despite of this fact, we think we have to describe a number of security issues one must be aware of in case of using DHCPv6 in an open environment.
In this work will be shown the techniques for transition from IPv4 to IPv6 and shown the threats associated with IPv6 and security challenges in the transition from IPv4 to IPv6. According to IANA (Internet Assigned Numbers Authorithy)... more
In this work will be shown the techniques for transition from IPv4 to IPv6 and shown the threats associated with IPv6 and security challenges in the transition from IPv4 to IPv6. According to IANA (Internet Assigned Numbers Authorithy) IPv4 addresses are nearly exhausted, and the transition to IPv6 is the only solution for the continued growth of the Internet. However IPv4 is not compatible with IPv6, but there are still a lot of networks using IPv4 so it is necessary create transitional methods for protocols operating simultaneously until there is the possibility of a complete transition to the IPv6 protocol. The transition must be made in this way so the network can communicate with both IPv4 and IPv6 networks. It is important to realize that this change will not happen overnight and it will be a process that will take some time. Who does not make this change in time, in future probably will have more costs because there will be no time to prepare a transition plan. The transition from IPv4 to IPv6 is a complex process, since it involves a series of changes in the network structure with the use of new IP address and new security threats will emerge beyond those already existing. To make this transition successfully is to choose the most appropriate method of transition for the company or organization, and involving the least impact on the safety level in order to make an effective transition, focusing on IPv6 advantages. As the security issues in IPv6 to IPv4 transition is still under study, there is still much to be explain.
Keywords: IPv4, IPv6, Transition, Security
Keywords: IPv4, IPv6, Transition, Security
This paper proposed ICMPv6 Flood Attack Detection using DENFIS algorithms to detect denial of service (DoS) attacks in IPv6 networks. We developed C# application to send the ICMPv6 flood attack packets the flooding packets were generated... more
This paper proposed ICMPv6 Flood Attack Detection using DENFIS algorithms to detect denial of service (DoS) attacks in IPv6 networks. We developed C# application to send the ICMPv6 flood attack packets the flooding packets were generated using different attack rates starting from 1000 Pings to 1500 Pings, and the normal traffic packets were generated using different ping rates starting from 10 Pings to 15 Pings, for each ICMPv6 Packet, RTT was calculated. The dataset consists of 2000 recorded, which divided into two sets: 80% for training and 20% for testing, the proposed proved that we can detect ICMPv6 Flood Attack with low root mean square error which about 0.26.
- by ammar almomani and +3
- •
- IPv6 Security
–The development of Internet protocols are greatly needed as the network security becomes one of the most important issues. This brings the need to develop IPv4 into IPv6 in order to proceed towards increasing the network capacity. Now... more
–The development of Internet protocols are greatly needed as the network security becomes one of the most important issues. This brings the need to develop IPv4 into IPv6 in order to proceed towards increasing the network capacity. Now Intruders are considered as one of the most serious threats to the internet security. Data mining techniques have been successfully utilized in many applications. M any research projects have applied data mining techniques to intrusion detection. Furthermore different types of data mining algorithms are very much useful to intrusion detection such as Classification, Link Analysis and Sequence Analysis. Moreover, one of the major challenges in securing fast networks is the online detection of suspicious anomalies in network traffic pattern. Most of the current security solutions failed to perform the security task in online mode because of the time needed to capture the packets and making decision about it. Practically, this study provides alliterative survey for the enhancement associated with IPv6 in terms of its security related functions. It is worthy mentioned that this study is concurred with the data mining approaches that have been used to detect intrusions.
- by Redhwan Alnakhlany and +1
- •
- IPv6 Security
This work will be shown the advantages of tech-niques for a transition from IPv4 to IPv6 as an assessment of their advantages and disadvantages. According to IANA (Inter-net Assigned Numbers Authorithy) IPv4 addresses are almost... more
This work will be shown the advantages of tech-niques for a transition from IPv4 to IPv6 as an assessment of their advantages and disadvantages. According to IANA (Inter-net Assigned Numbers Authorithy) IPv4 addresses are almost exhausted, and the transition to IPv6 is the only solution to the continuing growth of the Internet. However IPv4 is not compatible with IPv6 but, still there are many IPv4 networks that use that protocol so, it is necessary create a transition method and both protocols work simultane-ously until there is the possibility of making a full transition to the IPv6 protocol. The transition will have to be done this way so that the network can communicate with both IPv4 and IPv6 networks. It is important to realize that this change will not happen overnight, and it's going to be a process that will take some time. Those who do not make this change in time in the future may have more costs because there will be no time to prepare a transition plan. The transition from IPv4 to IPv6 is a complex process, since it involves a series of changes in the network structure with the use of new IP addresses. To do a successfully transition is nec-essary choose the most appropriate method of transition for the company or organization to make an efficient transition, focus-ing on IPv6 advantages.
Keywords – Ipv4, IPv6, Transition
Keywords – Ipv4, IPv6, Transition
Related Topics