R Eview on Ip V 6 S Ecurity V Ulnerability I Ssues and M Itigation

نویسندگان

  • Raja Kumar Murugesan
  • Sureswaran Ramadass
چکیده

One of the main purposes of Internet Protocol version 6 (IPv6) developments was to solve the IP address depletion concern due to the burgeoning growth of the Internet users. The new Internet protocol provides end-to-end communication, enhanced security and extensibility apart from the other features such as address auto-configuration or plug-and-play and faster packet processing in the routers. However, as a new technology, it is also reported that the protocol introduces some security vulnerabilities both in the header format and in the other protocols associated to it. This paper reviews IPv6 security vulnerabilities that have large potential exploitation in terms of denial of service attacks. The IPv6 security vulnerabilities are classified under three categories that include the IPv6 main header field, IPv6 extension header and Neighbour Discovery Protocol (NDP). This paper also summarizes the current mitigation methods proposed by researchers and practitioners to secure from these IPv6 security vulnerabilities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Amitraz Poisoning; A case study

A m i t r a z, a n i ns e c t i c i d e /a ca ri c i de of the f o r m a m i d i n e p e st i c i d e s group, is a ? 2 a d r e n e r g i c ag on i st a nd of t he a m i d i ne c h e m i ca l f a m il y generally us e d to c o n t r ol animal e c top a r a s i t e s. Poisoning due to am i t r a z i s r a r e and character...

متن کامل

On the possible volume of $mu$-$(v,k,t)$ trades

‎A $mu$-way $(v,k,t)$ $trade$ of volume $m$ consists of $mu$‎ ‎disjoint collections $T_1$‎, ‎$T_2‎, ‎dots T_{mu}$‎, ‎each of $m$‎ ‎blocks‎, ‎such that for every $t$-subset of $v$-set $V$ the number of‎ ‎blocks containing this t-subset is the same in each $T_i (1leq‎ ‎i leq mu)$‎. ‎In other words any pair of collections ${T_i,T_j}$‎, ‎$1leq i< j leq mu‎$ is a $(v,k,t)$ trade of volume $m$. In th...

متن کامل

Effect of whey protein coating on Physic-Chemical properties of gutted Kilka during frozen storage

 The a im of th is paper was to study the effects w hey pro t e in c oat i ng on ch e m ic al a nd physic al properties of gut t ed K i l ka dur i ng f roz en stor a ge. Coating of Kilka has done by dipping in whey protein solution with different concentrations of 3, 7, 10 and 13%, for 1h. Then, after being packed in polyethylene dishes, they were covered in cellophane blanket and stored in -18...

متن کامل

Fourth order and fourth sum connectivity indices of tetrathiafulvalene dendrimers

The m-order connectivity index (G) m of a graph G is     1 2 1 1 2 1 ... ... 1 ( ) i i im m v v v i i i m d d d  G where 1 2 1 ... i i im d d d  runs over all paths of length m in G and i d denotes the degree of vertex i v . Also,        1 2 1 1 2 1 ... ... 1 ( ) i i im m v v v i i i ms d d d X G is its m-sum connectivity index. A dendrimer is an artificially manufactured or synth...

متن کامل

A Survey on Complexity of Integrity Parameter

Many graph theoretical parameters have been used to describe the vulnerability of communication networks, including toughness, binding number, rate of disruption, neighbor-connectivity, integrity, mean integrity, edgeconnectivity vector, l-connectivity and tenacity. In this paper we discuss Integrity and its properties in vulnerability calculation. The integrity of a graph G, I(G), is defined t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012