2014 4th International Conference on Engineering Technology and Technopreneuship (ICE2T) 2014
DOI: 10.1109/ice2t.2014.7006224
|View full text |Cite
|
Sign up to set email alerts
|

Security threats for IPv6 transition strategies: A review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Where x1: NUM, x2: AVRG, and y: attack (A) or normal (N) 4. Determination of rules aggregation and defuzzification processes: the rule aggregation involves combining the fuzzy sets that represent the rules' output into a single fuzzy set.…”
Section: Construction Of Fuzzy Rules: Two Fuzzy Linguisticmentioning
confidence: 99%
See 1 more Smart Citation
“…Where x1: NUM, x2: AVRG, and y: attack (A) or normal (N) 4. Determination of rules aggregation and defuzzification processes: the rule aggregation involves combining the fuzzy sets that represent the rules' output into a single fuzzy set.…”
Section: Construction Of Fuzzy Rules: Two Fuzzy Linguisticmentioning
confidence: 99%
“…As the deployment of IPv6 proceeds, security issues concurrently come up. Several research have been published to address the open issues of IPv6 protocol vulnerabilities [4,9]. Some vulnerabilities discovered to date can be fixed through software patches, for instance, tunnel incorrect configuration that allows external traffic to flow through it.…”
Section: Introductionmentioning
confidence: 99%
“…To exacerbate the issue, there is even a toolset that was developed to attack IPv6, called the Hacker's Choice IPv6 (THC-lPv6). The many attacks targeted towards NDP are further described in the following sections: 1) Spoofing Attack: This attack involves an attacking node that gains unauthorized access by making use of the address or identifier of another node [13]. This attack could also give rise to different attacks such as DoS and MITM (Man-In-The-Middle) attacks.…”
Section: ) Redirectmentioning
confidence: 99%
“…Consequently, IPv4 and IPv6 will need to coexist for some time before IPv4 can be completely excluded. As IPv4 and IPv6 are not compatible with each other, numerous transition technologies have been developed by the IETF to help in the gradual yet smooth full adoption of IPv6 [3].…”
Section: Introductionmentioning
confidence: 99%
“…However, Dual Stack, even with "Happy Eyeballs", introduces unnecessary complication as both IPv4 and IPv6 protocols should be maintained and makes the network nodes more vulnerable to security threats. Not to say that it does not participate in solving the problem of the depletion of IPv4 addresses [3].…”
Section: Introductionmentioning
confidence: 99%