2015
DOI: 10.1007/978-3-319-20034-7_16
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing the IPv6 Security Landscape by Large-Scale Measurements

Abstract: Abstract. Networks are transitioning from IP version 4 to the new version 6. Fundamental differences in the protocols introduce new security challenges with varying levels of evidence. As enabling IPv6 in an existing network is often already challenging on the functional level, security aspects are overlooked, even those that are emphasized in literature. Reusing existing security solutions for IPv4 might seem easy and cost-effective, but is based on the unproven assumption that IPv6 attack traffic features th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…However, DHCPv6 has vulnerabilities which could threaten the security of IPv6 network. Several studies, such as [12] and [13], addressed and discussed the DHCPv6 security issues. Some of the vulnerabilities allow attackers to exploit DHCPv6 messages to provide incorrect configuration parameters to the client, either to divert the client's traffic towards a rogue server or to cause DoS [14]- [16].…”
Section: Introductionmentioning
confidence: 99%
“…However, DHCPv6 has vulnerabilities which could threaten the security of IPv6 network. Several studies, such as [12] and [13], addressed and discussed the DHCPv6 security issues. Some of the vulnerabilities allow attackers to exploit DHCPv6 messages to provide incorrect configuration parameters to the client, either to divert the client's traffic towards a rogue server or to cause DoS [14]- [16].…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, actual exchange of messages can occur between the two nodes. In IPv6, NDP uses ICMPv6 type field values ranging from 133 to 137 to achieve its purpose [6]. Table 1 presents the NDP-related ICMPv6 type field values and their use.…”
Section: Introductionmentioning
confidence: 99%
“…Such scaling barriers preclude many IPv4 defense schemes, including URL content categorization, IP reputation systems and IP blacklisting [6]. Adapting darknets (routable address spaces with no active services except passive packet collectors) for IPv6 space in the wider context of IPv6 situational awareness remains an active research area [7].…”
mentioning
confidence: 99%