Hanumanthappa, J. (2009) Ipv6 and ipv4 threat reviews with automatic tunneling and configuration tunneling considerations transitional model: a case study for university of Mysore network. International Journal of Computer Science and Information Security, 3. ISSN 1947- 5500
Full text not available from this repository. (Request a copy)Abstract
The actual transition from IPv4 toIPv6 requires network administrators to become aware of the next generation protocol and the associated risk problems. Due to the scale and complexity of current internet architecture how to protect from the existing investment and reduce the negative influence to users and service providers during the transition from IPv4 to IPv6 is a very important future topic for the advanced version of an internet architecture.IPv6 for us provides a lot of new features which directly or indirectly the security environment for the devices connected to the dual private and public networks. However the very presence of IPv6 makes networks susceptible to attack. Moving to the Next Generation of Internet Protocol (IPv6) became an issue to solve many problems in the current generation. Tunneling is a widely accepted and a practical way to transition existing IPv4 network to the Next Generation Protocol IPv6.The universities as a high level learning organization should be the first mover to cope with this technology. By transitioning to IPv6 without adequate precautions an adversary can easily by pass the networks security infrastructure. Most of the network administrators are familiar of the security considerations with IPv4,however they are lacking knowledge for an IPv6.This paper summarizes and compares the IPv6 transition mechanisms translation methods like Dual Stack, Tunneling issues like IPv6 Automatic tunneling and manually configured tunneling considerations, the IPv6 transition scenarios,IPv6 transition security problems, highlights IPv6 and IPv4 threat review with automatic tunneling and configuration tunneling considerations. This paper evaluates and compares threats in IPv4 and IPv6 tunneling mechanisms. Automatic tunnels offer easy access to basic IPv6 connectivity in an unmanaged environment while negotiated tunnels offer the best solution when a provider is available locally. In this paper we have proposed a transitional threat model for automatic tunneling and a configuration tunneling that could be followed by the University of Mysore (UoM), to estimate automatic tunneling and a manually configured tunneling threat review issues. Further more, there are different tunneling mechanisms such as: IPv6 over IPv4 GRE Tunnel, Tunnel broker, Automatic IPv4 Compatible Tunnel, and Automatic 6-to-4 Tunnel and also outlines many of the common known threats against IPv6 and then it compares and contrast how these threats are similar ones, might affect an IPv6 network
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Automatic Tunneling and Configuration Tunneling and IPv4 and IPv6 and IPv6 Transition and IPv6 Tunneling and IPv6 Security |
Divisions: | Department of > Computer Science |
Depositing User: | Users 19 not found. |
Date Deposited: | 05 Sep 2019 10:40 |
Last Modified: | 05 Sep 2019 10:40 |
URI: | http://eprints.uni-mysore.ac.in/id/eprint/7654 |
Actions (login required)
View Item |