Characterizing the IPv6 Security Landscape by Large-Scale Measurements

Luuk Hendriks, Anna Sperotto, Aiko Pras

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
    16 Downloads (Pure)

    Abstract

    Networks are transitioning from IP version 4 to the new version 6. Fundamental differences in the protocols introduce new security challenges with varying levels of evidence. As enabling IPv6 in an existing network is often already challenging on the functional level, security aspects are overlooked, even those that are emphasized in literature. Reusing existing security solutions for IPv4 might seem easy and cost-effective, but is based on the unproven assumption that IPv6 attack traffic features the same characteristics. By performing network measurements and analyzing IPv6 attacks on the network-level, we determine the current state of security in the IPv6 domain. With the inevitable switch to the new protocol version, assessing the applicability of existing security approaches and determining the requirements for new solutions becomes a necessity.
    Original languageUndefined
    Title of host publicationProceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015
    Place of PublicationSwitzerland
    PublisherSpringer
    Pages145-149
    Number of pages5
    ISBN (Print)978-3-319-20033-0
    DOIs
    Publication statusPublished - 22 Jun 2015

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer International Publishing
    Volume9122
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Keywords

    • EWI-26601
    • IPv6
    • METIS-315111
    • IR-98840
    • Network Security

    Cite this

    Hendriks, L., Sperotto, A., & Pras, A. (2015). Characterizing the IPv6 Security Landscape by Large-Scale Measurements. In Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015 (pp. 145-149). (Lecture Notes in Computer Science; Vol. 9122). Switzerland: Springer. https://doi.org/10.1007/978-3-319-20034-7_16