2020
DOI: 10.14513/actatechjaur.v13.n2.530
|View full text |Cite
|
Sign up to set email alerts
|

Towards the Security Analysis of the Five Most Prominent IPv4aaS Technologies

Abstract: This paper surveys the five most important technologies for IPv4aaS (IPv4-as-a-Service), namely 464XLAT, DS-Lite (Dual-Stack Lite), lw4o6 (Lightweight 4over6), MAP-E and MAP-T. The aim of our effort is to identify the potential security issues within these technologies. We plan to perform their security analysis following the STRIDE approach, which stands for spoofing, tampering, repudiation, information disclosure, denial of service and elevation of privilege. We give a short introduction for the method. With… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…The first step in applying the STRIDE method is to build the DFD of the examined system and specify the potential attacking points at each element. Therefore, the DFD for DS-Lite was built as shown in Figure 5, which shows the spots (1)(2)(3)(4)(5)(6)(7)(8)(9)(10)(11). The security analysis is divided into several groups such as the traffic between the client and B4, then between B4 and the AFTR, etc.…”
Section: Applying Stride To Ds-litementioning
confidence: 99%
See 1 more Smart Citation
“…The first step in applying the STRIDE method is to build the DFD of the examined system and specify the potential attacking points at each element. Therefore, the DFD for DS-Lite was built as shown in Figure 5, which shows the spots (1)(2)(3)(4)(5)(6)(7)(8)(9)(10)(11). The security analysis is divided into several groups such as the traffic between the client and B4, then between B4 and the AFTR, etc.…”
Section: Applying Stride To Ds-litementioning
confidence: 99%
“…Various transition technologies have been proposed to address this challenge, but each comes with its own set of drawbacks and vulnerabilities. In previous research work, a survey of the most prominent IPv6 transition technologies was conducted [2], in which it was pointed out that the combination of DNS64 [3] and NAT64 [4] could be a working solution for the communication of IPv6 clients with IPv4 servers.…”
Section: Introductionmentioning
confidence: 99%
“…The rapid growth of the Internet over the past few years has led to the actual depletion of IPv4 addresses in 2011 [1], which makes the adoption of IPv6 a necessity more than ever before. In addition to solving this problem, transitioning from IPv4 to IPv6 can help in solving many other problems such as the burden of NAT translation, the need for scalable routing tables, and the delay of the defragmentation process in the intermediary devices [2].…”
Section: Introductionmentioning
confidence: 99%