Feasible threats by manipulating tunneling packet on 6to4 network

Utomo Yusuf, Rizki Munawir and Bahaman, Nazrulazhar and Hassan, Aslinda (2014) Feasible threats by manipulating tunneling packet on 6to4 network. In: International Conference on Telecommunication, Electronic and Computer Engineering (ICTEC 2015), 16 - 17 Nov 2014, Melaka, Malaysia. (Submitted)

[img] Text
Possible Attack on 6to4 Network ver9.pdf - Accepted Version

Download (1MB)

Abstract

Tunneling mechanism becomes the most delicate transition mechanism compared to other transition mechanism, Dual Stack and Address Translation because tunneling offers easier way to start migrating from IPv4 to IPv6 and offers a smooth transition. 6to4 tunneling is automatic tunneling to conquer migration issues. In fact, tunnel transition mechanism is believed to be susceptible from several type of attacks. On 6to4 tunneling, Neighbor Discovery Protocol message becomes a potential media to exploit by attacker. It starts with deploying a controlled testbed network environment and running several scenario DoS attack by manipulating NDP message through 6to4 tunneling. The expected result is to prove that attacking methods is feasible and effective.

Item Type: Conference or Workshop Item (Paper)
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Faculty of Information and Communication Technology > Department of System and Computer Communication
Depositing User: Dr. Nazrulazhar Bahaman
Date Deposited: 20 Sep 2017 09:35
Last Modified: 20 Jul 2023 11:23
URI: http://eprints.utem.edu.my/id/eprint/19533
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item