首页    期刊浏览 2025年02月23日 星期日
登录注册

文章基本信息

  • 标题:IPv6 and deep packet inspection,
  • 本地全文:下载
  • 作者:Thomas B. Martin ; Holy Family University.
  • 期刊名称:Journal of Technology Research
  • 印刷版ISSN:1941-3416
  • 电子版ISSN:1941-3416
  • 出版年度:2012
  • 卷号:3
  • 期号:1
  • 出版社:Academic and Business Research Institute
  • 摘要:ABSTRACT The current version of the Internet, IPv4 was depleted of addresses on February 3, 2011.1 The shortage of addresses has led to the introduction of IPv6 which has 128-bit (16-byte) source and destination IP addresses. Many organizations do not see a reason to convert to IPv6, and believe they are not running IPv6.2 Whether an organization knows it or not, any laptop/PC running Vista or Windows 7 is a vulnerability from which attacks can come that will be invisible to IPv4 networks. Since the Internet today uses IPv4 for 99% of the traffic3, it will be a slow migration to IPv6. Three transition strategies are being employed: header translation, dual stack and tunneling of IPv6 inside IPv4.4 Tunneling is the most precarious method for today’s IPv4 networks. The IPv6 packet is included inside the message field of an IPv4 packet. The contents of the IPv6 packet will not be noticed by an IPv4 firewall or intrusion detection system. Hidden IPv6 traffic running across an organization’s network can wreak havoc, allow malware to enter the network, and be the basis for a denial of service attack.5 The only defense against such attacks is deep packet inspection (DPI). The widespread use of DPI is inevitable. The first serious security breach caused by tunneled IPv6 inside an IPv4 packet is certain to come in the near future. This event will be a stimulus to organizations to defend against such attacks.
  • 关键词:Keywords: IPv4, IPv6, deep packet inspection, cyber terrorism, security
国家哲学社会科学文献中心版权所有