IPv6 Security and Forensics
Document Type
Contribution to Book
Publication Date
8-24-2016
Publication Title
Proceedings of the IEEE International Conference on Innovative Computing Technology
DOI
10.1109/INTECH.2016.7845143
ISBN
978-1-5090-2000-3
Abstract
IPv4 is the historical addressing protocol used for all devices connected worldwide. It has survived for over 30 years and has been an integral part of the Internet revolution. However, due to its limitation, IPv4 is being replacing by IPv6. Today, IPv6 is more and more widely used on the Internet. On the other hand, criminals are also well aware of the introduction of IPv6. They are continuously seeking new methods to make profit, hiding their activities, infiltrate or exfiltrate important data from companies. The introduction of this new protocol may provide savvy cybercriminals more opportunities to discover new system vulnerabilities and exploit them. To date, there is little research on IPv6 security and forensics in the literature. In this paper, we look at different types of IPv6 attacks and we present a new approach to investigate IPv6 network attack with case studies.
Recommended Citation
Nicolls, Vincent, Nhien-An Le-Khac, Lei Chen, Mark Scanlon.
2016.
"IPv6 Security and Forensics."
Proceedings of the IEEE International Conference on Innovative Computing Technology: 743-748 Dublin, Ireland: IEEE.
doi: 10.1109/INTECH.2016.7845143 source: https://ieeexplore.ieee.org/document/7845143 isbn: 978-1-5090-2000-3
https://digitalcommons.georgiasouthern.edu/information-tech-facpubs/59