{"title":"Ipv6中Type 0路由头漏洞的防范算法","authors":"Mohit Wadhwa, Manju Khari","doi":"10.1109/CICN.2011.133","DOIUrl":null,"url":null,"abstract":"The next generation internet protocol version 6 was developed by the network working group of the Internet Engineering Task Force (IETF), to extend and eventually replace IPv4 capabilities and brings many new features over IPv4 like large address space, flow labelling capabilities, expended address capabilities, demand for real time data transfer, security at IP level and so on. However there are various vulnerabilities reported in contrast to the new features emerging in IPv6. One of the kinds of these vulnerabilities exists in routing header of IPv6. Routing header is a kind of extension header of IPv6 and it's used by an IPv6 source to list one or more intermediate nodes to be visited on the way to a packet destination. But routing header has serious vulnerability and by using this vulnerability attacker can by-pass the security principles at packet filtering system such as router/firewall without breaking the packet filtering rules and than he can access the internal protected network by using routing header. This paper suggests a prevention algorithm that uses with existed packet filtering system and solves the vulnerabilities caused by routing header.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"65 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Prevention Algorithm against the Vulnerability of Type 0 Routing Header in Ipv6\",\"authors\":\"Mohit Wadhwa, Manju Khari\",\"doi\":\"10.1109/CICN.2011.133\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The next generation internet protocol version 6 was developed by the network working group of the Internet Engineering Task Force (IETF), to extend and eventually replace IPv4 capabilities and brings many new features over IPv4 like large address space, flow labelling capabilities, expended address capabilities, demand for real time data transfer, security at IP level and so on. However there are various vulnerabilities reported in contrast to the new features emerging in IPv6. One of the kinds of these vulnerabilities exists in routing header of IPv6. Routing header is a kind of extension header of IPv6 and it's used by an IPv6 source to list one or more intermediate nodes to be visited on the way to a packet destination. But routing header has serious vulnerability and by using this vulnerability attacker can by-pass the security principles at packet filtering system such as router/firewall without breaking the packet filtering rules and than he can access the internal protected network by using routing header. This paper suggests a prevention algorithm that uses with existed packet filtering system and solves the vulnerabilities caused by routing header.\",\"PeriodicalId\":292190,\"journal\":{\"name\":\"2011 International Conference on Computational Intelligence and Communication Networks\",\"volume\":\"65 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-10-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Computational Intelligence and Communication Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CICN.2011.133\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Computational Intelligence and Communication Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICN.2011.133","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Prevention Algorithm against the Vulnerability of Type 0 Routing Header in Ipv6
The next generation internet protocol version 6 was developed by the network working group of the Internet Engineering Task Force (IETF), to extend and eventually replace IPv4 capabilities and brings many new features over IPv4 like large address space, flow labelling capabilities, expended address capabilities, demand for real time data transfer, security at IP level and so on. However there are various vulnerabilities reported in contrast to the new features emerging in IPv6. One of the kinds of these vulnerabilities exists in routing header of IPv6. Routing header is a kind of extension header of IPv6 and it's used by an IPv6 source to list one or more intermediate nodes to be visited on the way to a packet destination. But routing header has serious vulnerability and by using this vulnerability attacker can by-pass the security principles at packet filtering system such as router/firewall without breaking the packet filtering rules and than he can access the internal protected network by using routing header. This paper suggests a prevention algorithm that uses with existed packet filtering system and solves the vulnerabilities caused by routing header.