BibTex RIS Cite

IPv6 Security Vulnerabilities

Year 2012, Volume: 1 Issue: 4, 100 - 105, 30.12.2012

Abstract

Abstract--Internet Protocol version 6 (IPv6) is the newest version of the protocol that is used for communications on the Internet. And it has been in existence for many years. But, currently many organizations have slowed their migration to IPv6 because they realize that the security considerations and products for IPv6 might be insufficient, despite the fact that the network infrastructure is ready to support IPv6 transport. They realize that they cannot deploy IPv6 without first considering the security of this protocol. IPv6 security vulnerabilities currently exist, and as the popularity of the IPv6 protocol increases, so do the number of threats. This paper covers and reviews some of the fundamental vulnerabilities topics of IPv6 security, considerations, issues and threats. At the end, it concludes summarizing some of the most common security concerns the new suite of protocols creates.

References

  • Al-Radhi, A, A. 2011. IPv6 Promised Role in Mitigating Cyber Attacks: Really it’s Time . Swiss Cyber Storm- International IT Security Conference, Switzerland.
  • Khaldoun, B. Khaled, B. Amer, A. 2011. THE NEED FOR IPv6. International Journal of Academic Research, Vol. 3. No. 3. II Part. PP.431-448, Azerbaijan. http://www.ijar.lit.az
  • Minoli, D. Kouns, J. 2009. Security in an IPv6 Environment. CRC Press, USA.
  • Davies, J. 2008. Understanding IPv6. 2nd edition. Microsoft Press, USA.
  • Hogg, S. Vyncke, E. 2009. IPv6 Security, Cisco Press, USA.
  • White Paper, (Published: September 2003 & Updated: January 2008). Microsoft Windows Server 2008, Introduction to IP Version 6, Microsoft Corporation, USA.
  • White paper 2004. IPv6 and IPv4 Threat Comparison and Best Practice Evaluation(v1.0) , Cisco Press, USA. [8] Szigeti, S.; Risztics, P. 2004. Will IPv6 bring better security?. Proceedings 30th Euromicro Conference, vol., 532- 537, 31 Aug.-3 Sept.
  • Sotillo, S. 2006. IPv6 Security Issues. East Carolina University, USA.
  • Choudhary, A. R. Sekelsky, A. 2010. Securing IPv6 Network Infrastructure: a New Security Model. IEEE Conference, USA.
  • Blanchet, M. 2006. Migrating to IPv6. John Wiley & Sons Ltd,England.
  • Hagen, S. 2006. IPv6 Essentials, 2nd edition. O'Reilly Media.
  • Popoviciu, C. Abegnoli, E. L. Grossetete, P. 2006. Deploying IPv6 Networks. Cisco Press, USA.
  • Karlsson, B. 2003. Cisco Self-Study: Implementing IPv6 Networks (IPV6). Cisco Press, USA.
  • Li, Q. Jinmei, T. Shima, K. 2009. Mobile IPv6: Protocols and Implementation, Elsevier Inc. USA.
  • Hauser, V. 2008. Attacking the IPv6 Protocol Suite, The Hacker's Choice, http://www.thc.org/thc-ipv6.
  • Cisco IOS Learning Services. 2002.The ABCs of IP Version 6, Cisco Press, http://www.cisco.com/go/abc.
  • White Paper, October 2011, IPv6 Security Brief,Cisco Press.
  • Yoo, H. S. Cagalaban, G. A. Kim, S. H. 2009, A Study on the Connectivity of IPv6 to IPv4 Domains and Its Security Issues, International Journal of Advanced Science and Technology, Vol. 10, Korea.
  • Merike, K. Green D. Bound, J. and Pouffary, Y. July 2006. IPv6 Security Technology Paper. North American IPv6 Task Force (NAv6TF) Technology Report,
  • http://www.nav6tf.org/documents/nav6tf.security_repor t.pdf
  • Warfield, M. H. 2003. Security Implications of IPv6 Whitepaper.
  • http://documents.iss.net/whitepapers/IPv6.pdf. Security
  • Systems, [22] Santos, O. 2008. End-To-End Network Security: Defense-In-Depth. Cisco Press, USA.
  • Hardjono, T. and Dondeti, L. R. 2003. Multicast and Group Security. Artech House computer security series. USA.
  • White Paper. May, 2011. IPv6 Security v1.1. The Government of the Hong Kong Special Administrative Region.
  • Ferguson, N. and Schneier, B. 2002. A Cryptographic Evaluation
  • http://www.counterpane.com/ipsec.html Counterpane
  • Labs, [26] Gelogo, Y. E. Caytiles, R. D. Park, B. December, 2011. Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security, International Journal of Control and Automation Vol. 4, No. 4. PP:179-184.
  • Narten, T. Nordmark, E. Simpson, W. Soliman, H. September 2007. Neighbor Discovery for IP version 6 (IPv6), Internet Engineering Task Force: RFC 4861, http://www.ietf.org/rfc/rfc4861.txt
Year 2012, Volume: 1 Issue: 4, 100 - 105, 30.12.2012

Abstract

References

  • Al-Radhi, A, A. 2011. IPv6 Promised Role in Mitigating Cyber Attacks: Really it’s Time . Swiss Cyber Storm- International IT Security Conference, Switzerland.
  • Khaldoun, B. Khaled, B. Amer, A. 2011. THE NEED FOR IPv6. International Journal of Academic Research, Vol. 3. No. 3. II Part. PP.431-448, Azerbaijan. http://www.ijar.lit.az
  • Minoli, D. Kouns, J. 2009. Security in an IPv6 Environment. CRC Press, USA.
  • Davies, J. 2008. Understanding IPv6. 2nd edition. Microsoft Press, USA.
  • Hogg, S. Vyncke, E. 2009. IPv6 Security, Cisco Press, USA.
  • White Paper, (Published: September 2003 & Updated: January 2008). Microsoft Windows Server 2008, Introduction to IP Version 6, Microsoft Corporation, USA.
  • White paper 2004. IPv6 and IPv4 Threat Comparison and Best Practice Evaluation(v1.0) , Cisco Press, USA. [8] Szigeti, S.; Risztics, P. 2004. Will IPv6 bring better security?. Proceedings 30th Euromicro Conference, vol., 532- 537, 31 Aug.-3 Sept.
  • Sotillo, S. 2006. IPv6 Security Issues. East Carolina University, USA.
  • Choudhary, A. R. Sekelsky, A. 2010. Securing IPv6 Network Infrastructure: a New Security Model. IEEE Conference, USA.
  • Blanchet, M. 2006. Migrating to IPv6. John Wiley & Sons Ltd,England.
  • Hagen, S. 2006. IPv6 Essentials, 2nd edition. O'Reilly Media.
  • Popoviciu, C. Abegnoli, E. L. Grossetete, P. 2006. Deploying IPv6 Networks. Cisco Press, USA.
  • Karlsson, B. 2003. Cisco Self-Study: Implementing IPv6 Networks (IPV6). Cisco Press, USA.
  • Li, Q. Jinmei, T. Shima, K. 2009. Mobile IPv6: Protocols and Implementation, Elsevier Inc. USA.
  • Hauser, V. 2008. Attacking the IPv6 Protocol Suite, The Hacker's Choice, http://www.thc.org/thc-ipv6.
  • Cisco IOS Learning Services. 2002.The ABCs of IP Version 6, Cisco Press, http://www.cisco.com/go/abc.
  • White Paper, October 2011, IPv6 Security Brief,Cisco Press.
  • Yoo, H. S. Cagalaban, G. A. Kim, S. H. 2009, A Study on the Connectivity of IPv6 to IPv4 Domains and Its Security Issues, International Journal of Advanced Science and Technology, Vol. 10, Korea.
  • Merike, K. Green D. Bound, J. and Pouffary, Y. July 2006. IPv6 Security Technology Paper. North American IPv6 Task Force (NAv6TF) Technology Report,
  • http://www.nav6tf.org/documents/nav6tf.security_repor t.pdf
  • Warfield, M. H. 2003. Security Implications of IPv6 Whitepaper.
  • http://documents.iss.net/whitepapers/IPv6.pdf. Security
  • Systems, [22] Santos, O. 2008. End-To-End Network Security: Defense-In-Depth. Cisco Press, USA.
  • Hardjono, T. and Dondeti, L. R. 2003. Multicast and Group Security. Artech House computer security series. USA.
  • White Paper. May, 2011. IPv6 Security v1.1. The Government of the Hong Kong Special Administrative Region.
  • Ferguson, N. and Schneier, B. 2002. A Cryptographic Evaluation
  • http://www.counterpane.com/ipsec.html Counterpane
  • Labs, [26] Gelogo, Y. E. Caytiles, R. D. Park, B. December, 2011. Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security, International Journal of Control and Automation Vol. 4, No. 4. PP:179-184.
  • Narten, T. Nordmark, E. Simpson, W. Soliman, H. September 2007. Neighbor Discovery for IP version 6 (IPv6), Internet Engineering Task Force: RFC 4861, http://www.ietf.org/rfc/rfc4861.txt
There are 29 citations in total.

Details

Primary Language English
Journal Section Articles
Authors

Harith Dawood This is me

Publication Date December 30, 2012
Submission Date January 30, 2016
Published in Issue Year 2012 Volume: 1 Issue: 4

Cite

IEEE H. Dawood, “IPv6 Security Vulnerabilities”, IJISS, vol. 1, no. 4, pp. 100–105, 2012.