12 research outputs found

    Enhanced risk assessment equation for IPV6 deployment

    Get PDF
    Deploying IPv6 concomitant with the emerging technologies exposes the enterprise networks to the unforeseen threats as well as the existing threats.In mitigating the threats, calculating the risks value for each of the identified threats is vital. However, the existing equation for risk assessment is inappropriate to be applied in assessing the risks in IPv6 because of their limitation in asset determination.Therefore, this paper highlights the modification made in the existing risk assessment equation.The enhanced risk assessment equation is used to calculate the risk value for IPv6 deployment.The enhanced equation adapts three elements: confidentiality, integrity and availability in achieving security goals. The importance of having the enhanced equation is it enables the network administrator to calculate the potential risks for each of the potential IPv6 attack.Securing the enterprise networks is an iterative process that has no ended points. Hence, it is crucial to modify and adapt a proper equation when performing the risk assessment.In the future, more experiments will be conducted to test for feasibility of the equation

    Implementation of hybrid artificial intelligence technique to detect covert channels in new generation network protocol IPv6

    Get PDF
    Intrusion detection systems offer monolithic way to detect attacks through monitoring, searching for abnormal characteristics and malicious behavior in network communications. Cyber-attack is performed through using covert channel which currently, is one of the most sophisticated challenges facing network security systems. Covert channel is used to ex/infiltrate classified information from legitimate targets, consequently, this manipulation violates network security policy and privacy. The New Generation Internet Protocol version 6 (IPv6) has certain security vulnerabilities and need to be addressed using further advanced techniques. Fuzzy rule is implemented to classify different network attacks as an advanced machine learning technique, meanwhile, Genetic algorithm is considered as an optimization technique to obtain the ideal fuzzy rule. This paper suggests a novel hybrid covert channel detection system implementing two Artificial Intelligence (AI) techniques; Fuzzy Logic and Genetic Algorithm (FLGA) to gain sufficient and optimal detection rule against covert channel. Our approach counters sophisticated network unknown attacks through an advanced analysis of deep packet inspection. Results of our suggested system offer high detection rate of 97.7% and a better performance in comparison to previous tested techniques

    Security Aspects of IPv6-based Wireless Sensor Networks

    Get PDF
    Seamless integration of wireless sensor networks (WSN) with conventional IP-based networks is a very important basis for the Internet of Things (IoT) concept. To realize this goal, it is important to implement the IP protocol stack into a WSN. A global IP-based network is currently going through a transition from IPv4 to IPv6. Therefore, IPv6 should have priority in the implementation of the IP protocol into WSN. The paper analyses the existing security threats and possible countermeasures in IPv6-based WSNs. It also analyzes the implementation of a unique security framework for IPv6-based WSNs. The paper also analyzes a possible intrusion detection system for IPv6-based WSNs

    Security Aspects of IPv6-based Wireless Sensor Networks

    Get PDF
    Seamless integration of wireless sensor networks (WSN) with conventional IP-based networks is a very important basis for the Internet of Things (IoT) concept. To realize this goal, it is important to implement the IP protocol stack into a WSN. A global IP-based network is currently going through a transition from IPv4 to IPv6. Therefore, IPv6 should have priority in the implementation of the IP protocol into WSN. The paper analyses the existing security threats and possible countermeasures in IPv6-based WSNs. It also analyzes the implementation of a unique security framework for IPv6-based WSNs. The paper also analyzes a possible intrusion detection system for IPv6-based WSNs

    Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

    Get PDF
    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out

    IPv6-Only Network Design and Deployment at IITH

    Get PDF
    The aim of thesis is for deploying an IPv6 only daily base enterprise network in IITH and making it fully functional for the daily use and address some of the key current challenges. The motivation for deploying IPv6 only network in the campus is due to the depletion of IPv4 address space. The IPv4 address space is only 32 bits, therefore has 232 addresses whereas IPv6 addresses are represented by 128 bits thereby its address space consists of 2128 addresses which is quite enough to address all the particles in the world with an IP address. Because of this scarcity of IPv4 addresses, many public organizations implemented NAT (Network Address Translation) to map private IPv4 addresses to a single public IPv4 addresses. So like this way NAT helped in dealing with the problem of IPv4 address scarcity. But NAT has got many disadvantages such as NAT adds complexities and it has basic disconnectivity problem with IPv6 only enabled devices. Also NAT has many security issues such as it is not compatible with IPSec protocol. Morover NAT was meant to be just a temporary solution for IPv4 exhaustion. So came the IPv6 address which contains enough IPv6 addresses to address all the devices. But the problem is both IPv4 and IPv6 are not compatible and during initial phase of IPv6 deployment IPv4 and IPv6 coexist together.So there has to be some mechanism to translate IPv4 to IPv6 and vice versa
    corecore