期刊文献+

浅析IPv6的安全性

Security of IPv6
下载PDF
导出
摘要 与IPv4相比,IPv6具有许多优势。Ipv6不但解决了当今IP地址匮乏的问题,并且由于它引入了加密和认证机制,实现了基于网络层的身份认证,确保了数据包的完整性和机密性,因此,可以说IPV6实现了网络层安全。但是,这种安全不是绝对的,并且,由于IPV6的安全机制给当前的网络安全体系带来了新的挑战,致使许多在现有的网络中对保护网络安全中起着重要作用的工具受到巨大的冲击,这就迫切需要安全专家进一步研究和积累经验,尽快找出合适的解决方法。 IPv6(Internet Protocol version 6) is the successor to IPv4, which is the current IP protocol version used on the Intemet. Ipv6 not only eliminate the address exhaustion problem, but also improve IP layer security mechanisms. But the security mechanisms of Ipv6 also make great impact to today's network based intrude detection system can not work with Ipv6. The security experts have to find new way to protect the security of the next generation Intemet.
作者 鲍金玲
出处 《长春师范学院学报(自然科学版)》 2005年第4期67-72,共6页 Journal of Changchun Teachers College
关键词 网络 IPV6 IPSEC 安全 报头认证 安全加载封装 network IPv6 IPSec security AH ESP
  • 相关文献

参考文献5

  • 1[1]刍议IPv6的安全问题[OL].http://www.cc-ie.com/tech/Article-Show.asp?ArticleID=2004.
  • 2[2]IPv6的安全机制和实施[OL].http://www.jz165.com.cn/Article/ShowArticle.asp?ArticleID=138.
  • 3[6](美)Christian Huitema 著.陶文星,胡文才,译.新因特网协议IPv6(第二版)[M].清华大学出版社, 1999, 98-116.
  • 4许榕生,刘宝旭,等.入侵防范研究的展望[J].互联网世界,2001(2):39-40. 被引量:4
  • 5林曼筠,钱华林.入侵检测系统:原理、入侵隐藏与对策[J].微电子学与计算机,2002,19(1):54-59. 被引量:13

二级参考文献12

  • 1Debar, Hervé and Dacier et al. Towards a Taxonomy of Intrusion Detection Systems. Zurich, Switzerland, IBM Research, 1998(http: ∥www. zurich. ibm. com/).
  • 2T H Ptacek and T N Newsham. Insertion, evasion, and denial of service: Eluding Network Intrusion Detection.Technical report, Secure Networks Inc., January 1998.
  • 3http:∥www. phrack. org.
  • 4D Malkhi and M Reiter. Unreliable Intrusion Detection in Distributed Computations, Proc. of the 10th Computer Security Foundations Workshop, Rockport, MA, June 1997:116 ~ 124.
  • 5Paxson V . Bro: A System for Detecting Network Intruders in Real- Time. In Proc. of the 7th USENIX Security Symposium, San Antonio, TX, January 1998.
  • 6The LIDS Project. http: ∥www. lids. org.
  • 7Snapp S R, Brentano J, Dias G V, et al. DIDS - Motivation,Architecture and an Early Prototype, Proc. of the 14th National Computer Security Conference, Washington, D C.,Oct. 1991:167 ~ 176.
  • 8Eugene H Spafford and Diego Zamboni. Intrusion detection using autonomous agents. Computer Networks, October2000, 34(4): 547 ~ 570.
  • 9James P Anderson. Computer Security Threat Monitoring and Surveillance. Technical Report, James P Anderson Co.,Fort Washington, PA., 1980.
  • 10Dorothy Denning. An Intrusion Detection Model. IEEE Transactions on Software Engineering, 1987, 13 (2): 222 ~232.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部