期刊文献+

IPv6协议引入的安全新问题浅析 被引量:2

Analysis on the New Network Security Issues Arising from IPv6 Protocol
下载PDF
导出
摘要 IPv6协议虽然在某些方面增强了安全性,但同时也引入了新的安全风险,因此网络安全威胁在IPv6时代依旧存在。通过从IPv6地址、报文格式和相关协议等方面分析了IPv6可能带来的安全新问题,总结部分文献提出的防护措施,针对性的推荐了一些安全建议。 IPv6 protocol brings security enhancements into the current IP network in some aspects. Meanwhile, due to IPv6 protocol introducing new address formats, new packet formats and new protocol messages, some new security issues also have arisen. The analysis of that and related protection measures are proposed in this paper.
作者 曾睿
出处 《信息通信技术》 2009年第4期12-18,共7页 Information and communications Technologies
关键词 IPV6 网络安全 ICMPV6 NDP PMTU DHCPV6 IPv6 Network Security ICMPv6 NDP PMTU DHCPv6
  • 相关文献

参考文献9

  • 1Hinden R,,Deering S.IPv6 Multicast Address Assignments[].RFC.1998
  • 2JaeDeok Lim,YoungKi Kim.Protection Algorithm against security holes of IPv6 routing header[].IEEE ICAT.2006
  • 3Gont F.ICMP attacks against TCP[]..2005
  • 4Aura T.Cryptographically Generated Addresses (CGA)[].RFC.2005
  • 5Microsoft Security Bulletin MS05-019, Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial of Service (893066). http://www.microsoft. com/technet/security/Bulletin/ms05-019.mspx . 2007
  • 6Droms R,Bound J,Volz B,et al.Dynamic Host Configuration Protocol for IPv6(DHCPv6)[].RFC.2003
  • 7Deering S,Fenner W,Haberman B.Multicast Listener Discovery (MLD) for IPv6. RFC2710,IETF-1999 . 1999
  • 8R.Vida,,L.Costa.Multicast Listener Discovery Version 2(MLDv2)for IPv6[].RFC.2004
  • 9A. Conta,S. Deering."Internet Control Message Protocol (ICMPv6) for the lnternet Protocol Version 6 (IPv6) "[].RFC.2006

同被引文献21

  • 1李振强,赵晓宇,马严.IPv6安全脆弱性研究[J].计算机应用研究,2006,23(11):109-112. 被引量:16
  • 2SAVAGE S, WETHERALL D, KARLIN A, et al. Network support for IP traceback [ J]. IEEE/ACM Transactions on Networking, 2001, 9(3) : 226 -237.
  • 3LIU J, LEE Z-J, CHUNG Y-C. Dynamic probabilistic packet marking for efficient IP traceback [ J]. The International Journal of Computer and Telecommunications Networking 2007, 51 (3) : 866 - 882.
  • 4SAqTFARI P, GJOKA M, MARKOPOULOU A. A network coding approach to IP traceback[ C]//NetCod 2010: IEEE International Symposium on Network Coding. Piscataway, NJ: IEEE, 2010:1 -6.
  • 5WANG XIAO-JING, WEI SHENG-JUN. IP traceback based probabilistic packet marking and randomized network coding [ C]// Second International Workshop on Computer Science and Engineering. Washington, DC: IEEE Computer Society, 2009: 151- 154.
  • 6AHLSWEDE R, CAI N, LI S-H R, et al. Network information flow [ J]. IEEE Transactions on Information Theory, 2000, 46(4) : 1204 - 1216.
  • 7ROSS S. A first course in probability [ M]. Upper Saddle River, New Jersey: Pearson Prentice Hall, 2006.
  • 8DEB S, MEDARD M, CHONTE C. Algebraic gossip: a network coding approach to optimal muhipIe tumor mongering [ J]. IEEE Transactions on Information Theory, 2006, 52(6) : 2486 - 2507.
  • 9FRAGOULI C, SOLJANIN E. Network coding applications [ J]. Foundations and Trends in Networking, 2007, 2(2) : 135 -269.
  • 10GKANTSIDIS C, RODRIGUEZ P R. Network coding for large scale content distribution [ C]// Proceedings of IEEE INFOCOM. Piscataway, NJ: IEEE, 2005:2235 - 2245.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部