Security Aspects In Ip-V6-Networks - Implementation And Testing

Read Complete Research Material



Security Aspects in IP-v6-networks - Implementation and Testing

By

ACKNOWLEDGEMENT

This research would not have been possible without the support of my teacher & family so I would like to thank them for their support & help through out this project.

DECLARATION

I [type your full first names & surname here], hereby declare that the matter of this research is my own work & this research has not been submiited for any educational purpose before. Additionally this research presents my ideas & knowledge & not of university.

Signed __________________ Date _________________

ABSTRACT

Actual type of the Internet protocol (IPv4) has not considerably altered as it waspresented in 1981. The IPv4-protocol verified robust, somewhat so straightforward for implementation & interoperable, which endowed its survival throughout a fast growth of the Internet through years.

To eradicate some of the cited imperfections a new type of the Internet protocol (IP-v6) was evolved in 1990s. Although the IP-v6-protocol is still evolving, it is completely purposeful & its implementation & usage in genuine networks is possible. During the next couple of years the new IP-v6-protocol should restore an vintage IPv4 protocol. Because of tremendous dimensions of the Internet, transition from IPv4 to IP-v6 will not be instant. IP-v6, which should reinstate IPv4 true, adds many new features & improvements to the contemplation of the ease, speed, routing, quality of service & safety. In the evaluation of IPv4, IP-v6 improves the means to ensure security & confidentiality of information. Despite these improvements, network security remains a serious problem, because there are security threats, & type of stroke, which can affect IP-v6-network. Since the transition time span will not be short, these security risks due to transition means should be gravely taken into consideration. Generally, the IP-v6-protocol is more resistant to some security risks than the IPv4 protocol, but there are some security risks contrary to IPv4 networks that might furthermore sway an IP-v6-network. In IP-v6 all IPSec security services are supplied through a correct usage of IP-v6 security headers: Authentication header (AH) & encapsulating security payload (ESP header). Security headers can be utilized individually or together. A correct usage of the authentication header double-checks integrity of the Internet Protcol datagram bearing content verification facts & numbers for the datagram it is adhered to. It furthermore presents authentication of the Internet

TABLE OF CONTENTS

ACKNOWLEDGEMENTII

DECLARATIONIII

ABSTRACTIV

TABLE OF CONTENTSV

CHAPTER 1: INTRODUCTION1

Background of the study1

Problem Statement1

Research Aims & Objectives2

Significance of the Study3

Rationale/ Nature of the study3

Hypothesis/Research Question4

CHAPTER 2: LITERATURE REVIEW5

Internet Protcol spoofing7

Manual Key Management14

Automatic key management15

Deploying IP-v6 security features16

Virtual Private Networks16

The application-level security19

Deploying IP-v6 security features21

Virtual Private Networks21

CHAPTER 3: METHODOLOGY24

Research Design24

CHAPTER 4: DISCUSSION & ANALYSIS29

Threats (RFC 375 612) to IP-v6 Neighbor Discovery security30

IP-v6 threat of interception34

Why IP41

Monitors database security holes and five VCP settlement boundaries46

Why IP-v6?52

IP-v6 today53

Protect yourself53

CHAPTER 5: CONCLUSION55

REFERENCES57

CHAPTER 1: INTRODUCTION

Background of the study

Actual type of the Internet protocol (IPv4) has not considerably altered as it waspresented in 1981. The IPv4-protocol verified robust, somewhat so straightforward for implementation & interoperable, which endowed its survival throughout a fast growth of the Internet through ...
Related Ads