Feasible threats by manipulating tunneling packet on 6to4 network
Tunneling mechanism becomes the most delicate transition mechanism compared to other transition mechanism, Dual Stack and Address Translation because tunneling offers easier way to start migrating from IPv4 to IPv6 and offers a smooth transition. 6to4 tunneling is automatic tunneling to conquer migr...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2014
|
Subjects: | |
Online Access: | http://eprints.utem.edu.my/id/eprint/19533/1/Possible%20Attack%20on%206to4%20Network%20ver9.pdf http://eprints.utem.edu.my/id/eprint/19533/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utem.eprints.19533 |
---|---|
record_format |
eprints |
spelling |
my.utem.eprints.195332023-07-20T11:23:17Z http://eprints.utem.edu.my/id/eprint/19533/ Feasible threats by manipulating tunneling packet on 6to4 network Utomo Yusuf, Rizki Munawir Bahaman, Nazrulazhar Hassan, Aslinda TK Electrical engineering. Electronics Nuclear engineering Tunneling mechanism becomes the most delicate transition mechanism compared to other transition mechanism, Dual Stack and Address Translation because tunneling offers easier way to start migrating from IPv4 to IPv6 and offers a smooth transition. 6to4 tunneling is automatic tunneling to conquer migration issues. In fact, tunnel transition mechanism is believed to be susceptible from several type of attacks. On 6to4 tunneling, Neighbor Discovery Protocol message becomes a potential media to exploit by attacker. It starts with deploying a controlled testbed network environment and running several scenario DoS attack by manipulating NDP message through 6to4 tunneling. The expected result is to prove that attacking methods is feasible and effective. 2014-11-16 Conference or Workshop Item PeerReviewed text en http://eprints.utem.edu.my/id/eprint/19533/1/Possible%20Attack%20on%206to4%20Network%20ver9.pdf Utomo Yusuf, Rizki Munawir and Bahaman, Nazrulazhar and Hassan, Aslinda (2014) Feasible threats by manipulating tunneling packet on 6to4 network. In: International Conference on Telecommunication, Electronic and Computer Engineering (ICTEC 2015), 16 - 17 Nov 2014, Melaka, Malaysia. (Submitted) |
institution |
Universiti Teknikal Malaysia Melaka |
building |
UTEM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknikal Malaysia Melaka |
content_source |
UTEM Institutional Repository |
url_provider |
http://eprints.utem.edu.my/ |
language |
English |
topic |
TK Electrical engineering. Electronics Nuclear engineering |
spellingShingle |
TK Electrical engineering. Electronics Nuclear engineering Utomo Yusuf, Rizki Munawir Bahaman, Nazrulazhar Hassan, Aslinda Feasible threats by manipulating tunneling packet on 6to4 network |
description |
Tunneling mechanism becomes the most delicate transition mechanism compared to other transition mechanism, Dual Stack and Address Translation because tunneling offers easier way to start migrating from IPv4 to IPv6 and offers a smooth transition. 6to4 tunneling is automatic tunneling to conquer migration issues. In fact, tunnel transition mechanism is believed to be susceptible from several type of attacks. On 6to4 tunneling, Neighbor Discovery Protocol message becomes a potential media to exploit by attacker. It starts with deploying a controlled testbed network environment and running several scenario DoS attack by manipulating NDP message through 6to4 tunneling. The expected result is to prove that attacking methods is feasible and effective. |
format |
Conference or Workshop Item |
author |
Utomo Yusuf, Rizki Munawir Bahaman, Nazrulazhar Hassan, Aslinda |
author_facet |
Utomo Yusuf, Rizki Munawir Bahaman, Nazrulazhar Hassan, Aslinda |
author_sort |
Utomo Yusuf, Rizki Munawir |
title |
Feasible threats by manipulating tunneling packet on 6to4 network |
title_short |
Feasible threats by manipulating tunneling packet on 6to4 network |
title_full |
Feasible threats by manipulating tunneling packet on 6to4 network |
title_fullStr |
Feasible threats by manipulating tunneling packet on 6to4 network |
title_full_unstemmed |
Feasible threats by manipulating tunneling packet on 6to4 network |
title_sort |
feasible threats by manipulating tunneling packet on 6to4 network |
publishDate |
2014 |
url |
http://eprints.utem.edu.my/id/eprint/19533/1/Possible%20Attack%20on%206to4%20Network%20ver9.pdf http://eprints.utem.edu.my/id/eprint/19533/ |
_version_ |
1772816007384006656 |
score |
13.19449 |