2021 44th International Conference on Telecommunications and Signal Processing (TSP) 2021
DOI: 10.1109/tsp52935.2021.9522598
|View full text |Cite
|
Sign up to set email alerts
|

Testbed for the Security Analysis of the 464XLAT IPv6 Transition Technology in a Virtual Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…The first step in applying the STRIDE method is to build the DFD of the examined system and specify the potential attacking points at each element. Therefore, the DFD for DS-Lite was built as shown in Figure 5, which shows the spots (1)(2)(3)(4)(5)(6)(7)(8)(9)(10)(11). The security analysis is divided into several groups such as the traffic between the client and B4, then between B4 and the AFTR, etc.…”
Section: Applying Stride To Ds-litementioning
confidence: 99%
See 1 more Smart Citation
“…The first step in applying the STRIDE method is to build the DFD of the examined system and specify the potential attacking points at each element. Therefore, the DFD for DS-Lite was built as shown in Figure 5, which shows the spots (1)(2)(3)(4)(5)(6)(7)(8)(9)(10)(11). The security analysis is divided into several groups such as the traffic between the client and B4, then between B4 and the AFTR, etc.…”
Section: Applying Stride To Ds-litementioning
confidence: 99%
“…In [6], a security analysis for 464XLAT using the STRIDE method was presented, which highlighted the vulnerabilities and potential security threats of the technology. In [7], a testbed of 464XLAT was built using Debian-based virtual machines to evaluate the performance of the PLAT under a DoS (Denial of Service) attack, specifically testing the CPU performance and the pool of source port numbers. In a subsequent paper [8], the previous work was extended using a more powerful computer, allowing for an increase in the number of attacking clients (virtual machines) from 1 to 8.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, we built the DFD for DS-Lite in Fig. 5, where it shows the spots (1)(2)(3)(4)(5)(6)(7)(8)(9)(10)(11). The security analysis will be divided into several groups such as the tra c between the client and B4, then between B4 and the AFTR, etc.…”
Section: Applying Stride On Ds-litementioning
confidence: 99%
“…In [6], we presented the DFD (Data Flow Diagram) of 464XLAT and the security analysis of it by applying STRIDE method, where we showed the vulnerabilities and the potential security threats of this technology. In our next paper [7], we took it one step further when we built a testbed of 464XLAT using Debian based virtual machines and tested the performance of the PLAT under DoS (Denial of Service) attack to test the CPU performance and the pool of the source port numbers. In the latest one [8], we extended the previous paper [7] using a more powerful computer.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation