IPv6 Security and Forensics

Document Type

Contribution to Book

Publication Date

8-24-2016

Publication Title

Proceedings of the IEEE International Conference on Innovative Computing Technology

DOI

10.1109/INTECH.2016.7845143

ISBN

978-1-5090-2000-3

Abstract

IPv4 is the historical addressing protocol used for all devices connected worldwide. It has survived for over 30 years and has been an integral part of the Internet revolution. However, due to its limitation, IPv4 is being replacing by IPv6. Today, IPv6 is more and more widely used on the Internet. On the other hand, criminals are also well aware of the introduction of IPv6. They are continuously seeking new methods to make profit, hiding their activities, infiltrate or exfiltrate important data from companies. The introduction of this new protocol may provide savvy cybercriminals more opportunities to discover new system vulnerabilities and exploit them. To date, there is little research on IPv6 security and forensics in the literature. In this paper, we look at different types of IPv6 attacks and we present a new approach to investigate IPv6 network attack with case studies.

Share

COinS