Feasible threats by manipulating tunneling packet on 6to4 network

Tunneling mechanism becomes the most delicate transition mechanism compared to other transition mechanism, Dual Stack and Address Translation because tunneling offers easier way to start migrating from IPv4 to IPv6 and offers a smooth transition. 6to4 tunneling is automatic tunneling to conquer migr...

Full description

Saved in:
Bibliographic Details
Main Authors: Utomo Yusuf, Rizki Munawir, Bahaman, Nazrulazhar, Hassan, Aslinda
Format: Conference or Workshop Item
Language:English
Published: 2014
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/19533/1/Possible%20Attack%20on%206to4%20Network%20ver9.pdf
http://eprints.utem.edu.my/id/eprint/19533/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utem.eprints.19533
record_format eprints
spelling my.utem.eprints.195332023-07-20T11:23:17Z http://eprints.utem.edu.my/id/eprint/19533/ Feasible threats by manipulating tunneling packet on 6to4 network Utomo Yusuf, Rizki Munawir Bahaman, Nazrulazhar Hassan, Aslinda TK Electrical engineering. Electronics Nuclear engineering Tunneling mechanism becomes the most delicate transition mechanism compared to other transition mechanism, Dual Stack and Address Translation because tunneling offers easier way to start migrating from IPv4 to IPv6 and offers a smooth transition. 6to4 tunneling is automatic tunneling to conquer migration issues. In fact, tunnel transition mechanism is believed to be susceptible from several type of attacks. On 6to4 tunneling, Neighbor Discovery Protocol message becomes a potential media to exploit by attacker. It starts with deploying a controlled testbed network environment and running several scenario DoS attack by manipulating NDP message through 6to4 tunneling. The expected result is to prove that attacking methods is feasible and effective. 2014-11-16 Conference or Workshop Item PeerReviewed text en http://eprints.utem.edu.my/id/eprint/19533/1/Possible%20Attack%20on%206to4%20Network%20ver9.pdf Utomo Yusuf, Rizki Munawir and Bahaman, Nazrulazhar and Hassan, Aslinda (2014) Feasible threats by manipulating tunneling packet on 6to4 network. In: International Conference on Telecommunication, Electronic and Computer Engineering (ICTEC 2015), 16 - 17 Nov 2014, Melaka, Malaysia. (Submitted)
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
topic TK Electrical engineering. Electronics Nuclear engineering
spellingShingle TK Electrical engineering. Electronics Nuclear engineering
Utomo Yusuf, Rizki Munawir
Bahaman, Nazrulazhar
Hassan, Aslinda
Feasible threats by manipulating tunneling packet on 6to4 network
description Tunneling mechanism becomes the most delicate transition mechanism compared to other transition mechanism, Dual Stack and Address Translation because tunneling offers easier way to start migrating from IPv4 to IPv6 and offers a smooth transition. 6to4 tunneling is automatic tunneling to conquer migration issues. In fact, tunnel transition mechanism is believed to be susceptible from several type of attacks. On 6to4 tunneling, Neighbor Discovery Protocol message becomes a potential media to exploit by attacker. It starts with deploying a controlled testbed network environment and running several scenario DoS attack by manipulating NDP message through 6to4 tunneling. The expected result is to prove that attacking methods is feasible and effective.
format Conference or Workshop Item
author Utomo Yusuf, Rizki Munawir
Bahaman, Nazrulazhar
Hassan, Aslinda
author_facet Utomo Yusuf, Rizki Munawir
Bahaman, Nazrulazhar
Hassan, Aslinda
author_sort Utomo Yusuf, Rizki Munawir
title Feasible threats by manipulating tunneling packet on 6to4 network
title_short Feasible threats by manipulating tunneling packet on 6to4 network
title_full Feasible threats by manipulating tunneling packet on 6to4 network
title_fullStr Feasible threats by manipulating tunneling packet on 6to4 network
title_full_unstemmed Feasible threats by manipulating tunneling packet on 6to4 network
title_sort feasible threats by manipulating tunneling packet on 6to4 network
publishDate 2014
url http://eprints.utem.edu.my/id/eprint/19533/1/Possible%20Attack%20on%206to4%20Network%20ver9.pdf
http://eprints.utem.edu.my/id/eprint/19533/
_version_ 1772816007384006656
score 13.19449