期刊文献+

IPv6网络安全威胁分析 被引量:12

Analysis on IPv6 Network Security Threats
下载PDF
导出
摘要 IPv6是全球公认的下一代互联网商业解决方案,当前世界各国IPv6网络的部署日益广泛。IPv6作为新一代网络协议,在部署过程和使用过程中存在一定的安全隐患。文章介绍和分析IPv6地址、报头、ICMPv6、邻居发现协议、地址自动配置和过渡机制等方面存在的信息泄露、拒绝服务、重定向、网络欺骗等主要安全威胁,并给出相应的IPv6网络研究现状及防护建议与对策。 IPv6 is a globally recognized next-generation Internet business solution,and IPv6 networks are increasingly deployed in countries around the world.As a new generation network protocol,IPv6 has certain security risks in the process of deployment and utilization.This paper describes and analyzes the main security threats such as information leakage,denial of service,redirect,and network deception in IPv6 addresses,IPv6 headers,ICMPv6,neighbor discovery protocol,address autoconfiguration and transition mechanisms,and provides IPv6 network security research situation and corresponding IPv6 network protection recommendations and countermeasures.
作者 张连成 郭毅 Zhang Liancheng;Guo Yi(PLA Strategic Support Force Information Engineering University,Zhengzhou 450001,China)
出处 《信息通信技术》 2019年第6期7-14,共8页 Information and communications Technologies
基金 国家自然科学基金资助项目(61402526、61402525)
关键词 IPV6网络 IPv6部署 邻居发现 IPV6过渡 安全威胁 安全防护 IPv6 Network IPv6 Deployment Neighbor Discovery IPv6 Transition Security Threat Security Protection
  • 相关文献

参考文献3

二级参考文献19

  • 1张玉军,田野.IPv6协议安全问题研究[J].中国科学院研究生院学报,2005,22(1):30-37. 被引量:17
  • 2陆音,石进,黄皓,谢立.综述:关于IPv6安全性问题的研究[J].计算机科学,2006,33(5):5-11. 被引量:15
  • 3Lampson B.A Note on the Confinement Problem[J].Communication of the ACM,1973,16(10):613-615.
  • 4NCSC.NCSC-TG-030-1993 A Guide to Understand Covert Channel Analysis of Trusted System[S].1993.
  • 5Ahsan K.Covert Channel Analysis and Data Hiding in TCP/IP[D].Toronto,Ontario,Canada:University of Toronto,2002.
  • 6Rowland C H.Covert Channel in the TCP/IP Protocol Suite[J].IEEE Transactions on Signal Processing,1997,45(11):2758-2765.
  • 7Handle T,Sanford M.Hiding Data in the OSI Network Model[C]// Proceedings of the 1st International Workshop on Information.Hiding.Cambridge,U.K.:[s.n.],1996.
  • 8CAICEDO C E,JOSHI J B D,TULADHAR S R.IPv6 security chal-lenges[J].IEEE Computer Society,2009,42(2):36-42.
  • 9FRANKEL S,GRAVEMAN R,PEARCE J,et al.Guidelines for thesecure deployment of IPv6,SP800-119[R].[S.l.]:NIST,2010.
  • 10MONTGOMERY D,NIGHTINGALE S,FRANKEL S,et al.A profile for IPv6in the U.S.government,SP500-267[R].[S.l.]:NIST,2008.

共引文献22

同被引文献63

引证文献12

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部