Hyppää sisältöön
    • Suomeksi
    • In English
  • Suomeksi
  • In English
  • Kirjaudu
Näytä aineisto 
  •   Etusivu
  • 1. Kirjat ja opinnäytteet
  • Opinnäytetöiden tiivistelmät (ei kokotekstiä)
  • Näytä aineisto
  •   Etusivu
  • 1. Kirjat ja opinnäytteet
  • Opinnäytetöiden tiivistelmät (ei kokotekstiä)
  • Näytä aineisto
JavaScript is disabled for your browser. Some features of this site may not work without it.

IPv6 Threats and Vulnerability Issues

Simbaya, Amos (2017-01-18)

IPv6 Threats and Vulnerability Issues

Simbaya, Amos
(18.01.2017)

Tätä artikkelia/julkaisua ei ole tallennettu UTUPubiin. Julkaisun tiedoissa voi kuitenkin olla linkki toisaalle tallennettuun artikkeliin / julkaisuun.

Turun yliopisto
Näytä kaikki kuvailutiedot

Kuvaus

Siirretty Doriasta
Tiivistelmä
The remarkable growth of the Internet has revealed many security threats and vulnerability issues of IPv4. Consequently, IPv6 was introduced by the network working group IETF so as to address these problems and by introducing new features. However, these new features in IPv6 have in turn introduced many weaknesses that enable attackers to conduct network and Internet level attacks against IPv6, resulting in having IPv6 being partially accepted at international, national, and local level. The goal of this thesis was to gather and explore some of the security and vulnerabilities associated with IPv6 and their mitigations in order to make the protocol secure and adaptable. The thesis had two main research challenges, namely the new features of IPv6 and what security and vulnerability threats have they brought, and the mitigations for the identified security and vulnerabilities threats so as to make the IPv6 protocol secure, reliable, and adaptable. The thesis further looked at other research work left for the future in these main research challenges.

My evaluation after conducting the research was that some of the security threats and vulnerabilities found in IPv4 can still be launched against IPv6. Additionally, while the new features in IPV6 were designed to make IPv6 more efficient, they have created more security threats and vulnerability issues that hackers could exploit, including reconnaissance and network scanning, exploitation of IPv6 hosts through Buffer Overflow attacks, exploitation of IPv6 using MITM attacks, and Exploitation of IPv6 using DoS attacks. However, as the research showed, most of the security and vulnerability issues of IPv6 can be mitigated using different security defense methods despite the fact that there are several security challenges that still remain.
Kokoelmat
  • Opinnäytetöiden tiivistelmät (ei kokotekstiä) [6013]

Turun yliopiston kirjasto | Turun yliopisto
julkaisut@utu.fi | Tietosuoja | Saavutettavuusseloste
 

 

Tämä kokoelma

JulkaisuajatTekijätNimekkeetAsiasanatTiedekuntaLaitosOppiaineYhteisöt ja kokoelmat

Omat tiedot

Kirjaudu sisäänRekisteröidy

Turun yliopiston kirjasto | Turun yliopisto
julkaisut@utu.fi | Tietosuoja | Saavutettavuusseloste