By Topic

Experiments and Countermeasures of Security Vulnerabilities on Next Generation Network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)

IPv6 is the next generation protocol designed by the IETF to replace the current version Internet protocol, IPv4. It is difficult to translate immediately from IPv4 to IPv6 because of financial and technical problems. So mixed IPv4/IPv6 network is expected to be formed. IPv6 is more secure than IPv4, but IPv6 still has many security vulnerabilities that are not only the same on IPv4 but also the new. This paper describes the security vulnerabilities on IPv6 and IPv4/IPv6 network that are difference and new features in comparison to IPv4, and some possible solutions for security vulnerabilities on IPv6 and mixed IPv4/IPv6 network. Finally, this paper describes the scenarios of security vulnerabilities about the routing header and fragment header of IPv6, and source spoofing on DSTM, also the result of the experiments that are firewall evasion, DoS on native IPv6 network and DoS on DSTM.

Published in:

Future Generation Communication and Networking (FGCN 2007)  (Volume:2 )

Date of Conference:

6-8 Dec. 2007