Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network

Owner identification is an important aspect of improving network visibility and enhancing network security within local area networks deploying IPv6. This paper presents a simulation study for owner identification in an enterprise local area network from their IPv6 addresses. The study is based arou...

Full description

Saved in:
Bibliographic Details
Main Authors: Hakiem, Nashrul, Siddiqi, Mohammad Umar, Hashum , Mohamed Rafiq
Format: Article
Language:English
Published: International Journal of Network Security 2015
Subjects:
Online Access:http://irep.iium.edu.my/35419/1/35419.pdf
http://irep.iium.edu.my/35419/
http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-v17-n1.html
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.35419
record_format dspace
spelling my.iium.irep.354192017-08-04T03:17:06Z http://irep.iium.edu.my/35419/ Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network Hakiem, Nashrul Siddiqi, Mohammad Umar Hashum , Mohamed Rafiq TK5101 Telecommunication. Including telegraphy, radio, radar, television Owner identification is an important aspect of improving network visibility and enhancing network security within local area networks deploying IPv6. This paper presents a simulation study for owner identification in an enterprise local area network from their IPv6 addresses. The study is based around the reverse implementation (many-to-one mapping) of a one-to-many reversible mapping. The paper reviews the many-to-one mechanism and the associated simulation software development, followed by presentation of results obtained from required functional tests. The IPv6 address data can be obtained from the output of any network monitoring software. In addition to a text format for verification, it also uses a checksum for validation which is used during the IPv6 address generation and identification. The simulation software given here can easily identify an IPv6 address owner if the IPv6 address is properly generated by the mechanism and it can display particular verification messages. International Journal of Network Security 2015-01 Article REM application/pdf en http://irep.iium.edu.my/35419/1/35419.pdf Hakiem, Nashrul and Siddiqi, Mohammad Umar and Hashum , Mohamed Rafiq (2015) Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network. International Journal of Network Security, 17 (1). pp. 49-56. ISSN 1816-3548 (O), 1816-353X (P) http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-v17-n1.html
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic TK5101 Telecommunication. Including telegraphy, radio, radar, television
spellingShingle TK5101 Telecommunication. Including telegraphy, radio, radar, television
Hakiem, Nashrul
Siddiqi, Mohammad Umar
Hashum , Mohamed Rafiq
Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
description Owner identification is an important aspect of improving network visibility and enhancing network security within local area networks deploying IPv6. This paper presents a simulation study for owner identification in an enterprise local area network from their IPv6 addresses. The study is based around the reverse implementation (many-to-one mapping) of a one-to-many reversible mapping. The paper reviews the many-to-one mechanism and the associated simulation software development, followed by presentation of results obtained from required functional tests. The IPv6 address data can be obtained from the output of any network monitoring software. In addition to a text format for verification, it also uses a checksum for validation which is used during the IPv6 address generation and identification. The simulation software given here can easily identify an IPv6 address owner if the IPv6 address is properly generated by the mechanism and it can display particular verification messages.
format Article
author Hakiem, Nashrul
Siddiqi, Mohammad Umar
Hashum , Mohamed Rafiq
author_facet Hakiem, Nashrul
Siddiqi, Mohammad Umar
Hashum , Mohamed Rafiq
author_sort Hakiem, Nashrul
title Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
title_short Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
title_full Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
title_fullStr Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
title_full_unstemmed Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
title_sort simulation study of a many-to-one mapping for ipv6 address owner identification in an enterprise local area network
publisher International Journal of Network Security
publishDate 2015
url http://irep.iium.edu.my/35419/1/35419.pdf
http://irep.iium.edu.my/35419/
http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-v17-n1.html
_version_ 1643610786948448256
score 13.160551