ICMPV6 Vulnerability: The Importance of Threat Model and SF-ICMP6

نویسندگان

  • Abidah Hj Mat Taib
  • Wan Nor Ashiqin Wan Ali
  • Nurul Sharidah Shaari
چکیده

IPv6 existence has increased the challenges in maintaining security of an enterprise network. Besides taking a good care of the network operation and activities, analyzing the network vulnerabilities during IPv6 deployment is necessary. Some specific IPv6 vulnerabilities that are commonly debated are reconnaissance attacks, misuse of routing header type 0 (RH0), misuse of multicast, and misuse of ICMPv6 (Durdagl & Buldu, 2010). An overview of these vulnerabilities is depicted in Figure 1. By identifying the vulnerabilities of IPv6 and the cause that initiates them, determining the appropriate countermeasure is possible. Unfortunately, the misuses of multicast and ICMPv6 have not totally been solved. ICMPv6 is precisely designed to tell the host about errors encountered in incoming or outgoing packets. ABSTRACT

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Studying the causes and risk factors of vulnerability with SVA model and Resilience Engineering approach in National Iranian Gas Company about one of city gate stations

Background and purpose: Vulnerability introduces the sensitivity of a system versus internal faults or external threats. A vulnerable system cannot recover itself after shocks and may disable to provide services. I in this study in order to achieve a resilient city gate station (CGS), vulnerability of the system identified via SVA procedure. Moreover, using the resilience engineering approach s...

متن کامل

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

Analysis of Passive Defense in Plants and Equipment in Rasht

Metropolitan city of Rasht as the largest nucleus of population density in Gilan province place most of the manpower, investment, economic and infrastructure projects. The same subject make necessary to study the main arteries and land usage of Rasht city of in terms of passive defense. Passive defense as a set of preventive measures cause to increases deterrence, reducing vulnerability, sust...

متن کامل

Threat appraisal for skin cancer among rural farmers in Ilam, Iran

Background: Skin cancers are among the most prevalent malignancies in Iran. According to statistics, it is the most common cancer in the population of Ilam, west of Iran. The present study aimed to assess threat appraisal of skin cancer among rural farmers of Ilam in 2013-2014.Method: In this cross-sectional study, we used multistage random sampling. We collected the data through distribution o...

متن کامل

ارزیـابی آسیب‌پـذیـری آبخـوان دشت داورزن به روش دراستیک بـا استفـاده از سیستم اطـلاعات جغـرافیـایی (GIS)

Evaluation of the vulnerability of Davarzan Aquifer by DRASTIC method using GIS Abolghasem Amirahmadi Assistant Professor of Geomorphology, Department of Geography, Hakim Sabzevari University Zakeyyeh Abbariki Bachelor of Environmental Science & Cooperator of Geographical & Social Research Centre Majid Ebrahimi Master’s Degree of Physical Geography, Islamic Azad Universi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJMCMC

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2013