Security Aspects in IP-v6-networks - Implementation and Testing
By
ACKNOWLEDGEMENT
This research would not have been possible without the support of my teacher & family so I would like to thank them for their support & help through out this project.
DECLARATION
I [type your full first names & surname here], hereby declare that the matter of this research is my own work & this research has not been submiited for any educational purpose before. Additionally this research presents my ideas & knowledge & not of university.
Signed __________________ Date _________________
ABSTRACT
Actual type of the Internet protocol (IPv4) has not considerably altered as it waspresented in 1981. The IPv4-protocol verified robust, somewhat so straightforward for implementation & interoperable, which endowed its survival throughout a fast growth of the Internet through years.
To eradicate some of the cited imperfections a new type of the Internet protocol (IP-v6) was evolved in 1990s. Although the IP-v6-protocol is still evolving, it is completely purposeful & its implementation & usage in genuine networks is possible. During the next couple of years the new IP-v6-protocol should restore an vintage IPv4 protocol. Because of tremendous dimensions of the Internet, transition from IPv4 to IP-v6 will not be instant. IP-v6, which should reinstate IPv4 true, adds many new features & improvements to the contemplation of the ease, speed, routing, quality of service & safety. In the evaluation of IPv4, IP-v6 improves the means to ensure security & confidentiality of information. Despite these improvements, network security remains a serious problem, because there are security threats, & type of stroke, which can affect IP-v6-network. Since the transition time span will not be short, these security risks due to transition means should be gravely taken into consideration. Generally, the IP-v6-protocol is more resistant to some security risks than the IPv4 protocol, but there are some security risks contrary to IPv4 networks that might furthermore sway an IP-v6-network. In IP-v6 all IPSec security services are supplied through a correct usage of IP-v6 security headers: Authentication header (AH) & encapsulating security payload (ESP header). Security headers can be utilized individually or together. A correct usage of the authentication header double-checks integrity of the Internet Protcol datagram bearing content verification facts & numbers for the datagram it is adhered to. It furthermore presents authentication of the Internet
TABLE OF CONTENTS
ACKNOWLEDGEMENTII
DECLARATIONIII
ABSTRACTIV
TABLE OF CONTENTSV
CHAPTER 1: INTRODUCTION1
Background of the study1
Problem Statement1
Research Aims & Objectives2
Significance of the Study3
Rationale/ Nature of the study3
Hypothesis/Research Question4
CHAPTER 2: LITERATURE REVIEW5
Internet Protcol spoofing7
Manual Key Management14
Automatic key management15
Deploying IP-v6 security features16
Virtual Private Networks16
The application-level security19
Deploying IP-v6 security features21
Virtual Private Networks21
CHAPTER 3: METHODOLOGY24
Research Design24
CHAPTER 4: DISCUSSION & ANALYSIS29
Threats (RFC 375 612) to IP-v6 Neighbor Discovery security30
IP-v6 threat of interception34
Why IP41
Monitors database security holes and five VCP settlement boundaries46
Why IP-v6?52
IP-v6 today53
Protect yourself53
CHAPTER 5: CONCLUSION55
REFERENCES57
CHAPTER 1: INTRODUCTION
Background of the study
Actual type of the Internet protocol (IPv4) has not considerably altered as it waspresented in 1981. The IPv4-protocol verified robust, somewhat so straightforward for implementation & interoperable, which endowed its survival throughout a fast growth of the Internet through ...