2010 International Conference on Science and Social Research (CSSR 2010) 2010
DOI: 10.1109/cssr.2010.5773699
|View full text |Cite
|
Sign up to set email alerts
|

Securing tunnel endpoints for IPv6 transition in enterprise networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…To provide an eventual transition to IPv6 only infrastructure and to currently coexist with IPv4 infrastructure, various transition mechanisms are proposed by IETF. Tunnel and dual stack are the most common technologies used while IPv6 translation (Taib et al, 2007;Taib and Budiarto, 2010).…”
Section: Transition Technologymentioning
confidence: 99%
“…To provide an eventual transition to IPv6 only infrastructure and to currently coexist with IPv4 infrastructure, various transition mechanisms are proposed by IETF. Tunnel and dual stack are the most common technologies used while IPv6 translation (Taib et al, 2007;Taib and Budiarto, 2010).…”
Section: Transition Technologymentioning
confidence: 99%
“…When IPv6 packet is encapsulated in IPv4 payload then there is no means for administrators to know about IPv6 traffic that has tunneled into their networks (Sabnis and Tech, 2013). Unfortunately tunneling introduces security threats in which intruders may spoof the address of the packet origin and potentially inject the packet at the tunnel endpoint (Taib and Budiarto, 2010). Spoofing in IPv6 over IPv4 tunnel still represents a serious problem today, one of the solutions that been proposed is to use IPsec with ingress filtering.…”
Section: Introductionmentioning
confidence: 99%