Feasible threats by manipulating tunneling packet on 6to4 network

Tunneling mechanism becomes the most delicate transition mechanism compared to other transition mechanism, Dual Stack and Address Translation because tunneling offers easier way to start migrating from IPv4 to IPv6 and offers a smooth transition. 6to4 tunneling is automatic tunneling to conquer migr...

Full description

Saved in:
Bibliographic Details
Main Authors: Utomo Yusuf, Rizki Munawir, Bahaman, Nazrulazhar, Hassan, Aslinda
Format: Conference or Workshop Item
Language:English
Published: 2014
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/19533/1/Possible%20Attack%20on%206to4%20Network%20ver9.pdf
http://eprints.utem.edu.my/id/eprint/19533/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Tunneling mechanism becomes the most delicate transition mechanism compared to other transition mechanism, Dual Stack and Address Translation because tunneling offers easier way to start migrating from IPv4 to IPv6 and offers a smooth transition. 6to4 tunneling is automatic tunneling to conquer migration issues. In fact, tunnel transition mechanism is believed to be susceptible from several type of attacks. On 6to4 tunneling, Neighbor Discovery Protocol message becomes a potential media to exploit by attacker. It starts with deploying a controlled testbed network environment and running several scenario DoS attack by manipulating NDP message through 6to4 tunneling. The expected result is to prove that attacking methods is feasible and effective.