Security aspects in IPv6 networks - implementation and testing

被引:16
|
作者
Zagar, Drago
Grgic, Kresimir
Rimac-Drlje, Snjezana
机构
[1] J.J. Strossmayer University of Osijek, Faculty of Electrical Engineering, Osijek
关键词
IPv6; network security; firewall; intrusion detection;
D O I
10.1016/j.compeleceng.2007.05.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IPv6 protocol, which should replace the actual IPv4 protocol, brings many new possibilities and improvements considering simplicity, routing speed, quality of service and security. In comparison to IPv4, IPv6 improves mechanisms for assuring a secure and confidential transfer of information. Despite these improvements, network security remains a very important issue since there are some security threats and attack types that can affect IPv6 network. This paper deals with security issues in IPv6 networks. Security improvements and extensions in the IPv6 protocol are described and explained. Also, security comparison to IPv4 is made. A description of the experimental IPv6 network and a description of tools used for security testing are presented in the paper. Security threats similar in IPv4 and IPv6 networks are described, and some security issues specific for IPv6 networks are also analysed. Different types of attacks in IPv6 networks are analysed and some suggestions for their avoidance are given. Considering security, especially problematic is the transition period of coexistence of both protocols. Because of that, security issues due to different transition mechanisms are analysed. Further, the paper studies firewalls in IPv6 networks. Implementation of firewalls in IPv6 networks and IPv6 specific firewall configurations are analysed. Different tests of firewalls are performed, and their results are analysed. Also, comparison with IPv4 firewalls is made. Some suggestions referring to proper deployment of firewalls are given. This paper also deals with detection of unauthorised intrusion. Different approaches to intrusion detection are explained and different types of intrusion detection systems are described. Suggestions for proper positioning of intrusion detection systems in the local area network are given. In absence of non-commercial intrusion detection systems with IPv6 support, some alternative possibilities of intrusion detection are explained. The paper analyses methods of intrusion detection by using tools for network traffic capturing and analysis (with IPv6 support). Different types of attacks are performed and their effects are presented and explained. Instructions for recognition and detection of different attacks are given. Some recommendations for avoiding certain attack types or reducing their effect are given. Practical advices and guidelines in implementation of security mechanisms for packet filtering and detection of unauthorized intrusion are emphasized. Finally, some recommendations for improving security mechanisms and guidelines for further development of intrusion detection systems with IPv6 support are given. (C) 2007 Elsevier Ltd. All rights reserved.
引用
收藏
页码:425 / 437
页数:13
相关论文
共 50 条
  • [1] IPv6 security: Improvements and implementation aspects
    Zagar, D
    Vidakovic, S
    [J]. ConTEL 2005: Proceedings of the 8th International Conference on Telecommunications, Vols 1 and 2, 2005, : 29 - 34
  • [2] Testing IPv6 security
    Ball, A
    Cole, DG
    Nelson, NL
    [J]. SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 235 - 241
  • [3] Design and Implementation of Security System for IPv6 Sensor Networks
    Luo, Di
    Wang, Hao
    Yi, Shengwei
    Wang, Qiao
    [J]. COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2019), 2020, 993 : 257 - 268
  • [4] An Overview to Security Vulnerabilities for IPV6 Networks
    Kartal, Mehmet
    Sagiroglu, Seref
    Bulbul, Halil Ibrahim
    [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2013, 16 (03): : 119 - 127
  • [5] Security Concerns in IPv6 and Transition Networks
    Chasser, John M.
    [J]. INFORMATION SECURITY JOURNAL, 2010, 19 (05): : 282 - 293
  • [6] Implementation and Testing of IPv6 Transition Mechanisms
    Vivas Ruiz, Jesus Marco
    Silva Cardenas, Carlos
    Munoz Tapia, Jose Luis
    [J]. 2017 IEEE 9TH LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM), 2017,
  • [7] When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
    Hong, Hyunwook
    Choi, Hyunwoo
    Kim, Dongkwan
    Kim, Hongil
    Hong, Byeongdo
    Noh, Jiseong
    Kim, Yongdae
    [J]. 2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 595 - +
  • [8] Security on IPv6
    Yang, Dequan
    Song, Xu
    Guo, Qiao
    [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 3, 2010, : 323 - 326
  • [9] IPv6 Security for Low Power and Lossy Networks
    Rantos, Konstantinos
    Papanikolaou, Alexandros
    Manifavas, Charalampos
    Papaefstathiou, Ioannis
    [J]. 2013 IFIP WIRELESS DAYS (WD), 2013,
  • [10] IPv6 Security Challenges
    Caicedo, Carlos E.
    Joshi, James B. D.
    Tuladhar, Summit R.
    [J]. COMPUTER, 2009, 42 (02) : 36 - 42