IPv6路由报头安全漏洞防护算法

Jae-Deok Lim, Youngki Kim
{"title":"IPv6路由报头安全漏洞防护算法","authors":"Jae-Deok Lim, Youngki Kim","doi":"10.1109/ICACT.2006.206388","DOIUrl":null,"url":null,"abstract":"Current Internet is based on IPv4 protocol. However the limitation of IPv4 protocol such as a lack of address can put obstacles to continuous progress of Internet. IPv6 protocol is suggested and developed as an alternative of IPv4 protocol. IPv6 protocol has many features for example the expanded addressing capability, auto-configuration mechanism, simplification of the header format, improved support for extensions and options, extensions for authentication and privacy, flow labeling capability and so on. But many security holes of IPv6 are being reported together with the features as mentioned above. This paper suggests the algorithm to solve the security hole caused by a routing header. Routing header is a kind of extension headers of IPv6 and is used by an IPv6 source to list one or more intermediate nodes to be visited on the way to a packet's destination. But routing header has the security hole that an attacker can detour the access list of security system, for example firewall, and then he can access the protected internal system by using routing header","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Protection Algorithm against security holes of IPv6 routing header\",\"authors\":\"Jae-Deok Lim, Youngki Kim\",\"doi\":\"10.1109/ICACT.2006.206388\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Current Internet is based on IPv4 protocol. However the limitation of IPv4 protocol such as a lack of address can put obstacles to continuous progress of Internet. IPv6 protocol is suggested and developed as an alternative of IPv4 protocol. IPv6 protocol has many features for example the expanded addressing capability, auto-configuration mechanism, simplification of the header format, improved support for extensions and options, extensions for authentication and privacy, flow labeling capability and so on. But many security holes of IPv6 are being reported together with the features as mentioned above. This paper suggests the algorithm to solve the security hole caused by a routing header. Routing header is a kind of extension headers of IPv6 and is used by an IPv6 source to list one or more intermediate nodes to be visited on the way to a packet's destination. But routing header has the security hole that an attacker can detour the access list of security system, for example firewall, and then he can access the protected internal system by using routing header\",\"PeriodicalId\":247315,\"journal\":{\"name\":\"2006 8th International Conference Advanced Communication Technology\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-05-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 8th International Conference Advanced Communication Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACT.2006.206388\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 8th International Conference Advanced Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACT.2006.206388","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

当前的互联网是基于IPv4协议的。然而,IPv4协议的局限性,如地址的缺乏,阻碍了互联网的持续发展。提出并开发了IPv6协议作为IPv4协议的替代方案。IPv6协议有许多特性,例如扩展的寻址能力、自动配置机制、简化的报头格式、改进的扩展和选项支持、身份验证和隐私的扩展、流标记能力等等。但是IPv6的许多安全漏洞与上面提到的特性一起被报道出来。本文提出了一种解决路由头安全漏洞的算法。路由报头是IPv6的一种扩展报头,IPv6源使用它来列出一个或多个在数据包到达目的地的途中要访问的中间节点。但是路由头存在安全漏洞,攻击者可以绕过防火墙等安全系统的访问列表,利用路由头访问受保护的内部系统
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Protection Algorithm against security holes of IPv6 routing header
Current Internet is based on IPv4 protocol. However the limitation of IPv4 protocol such as a lack of address can put obstacles to continuous progress of Internet. IPv6 protocol is suggested and developed as an alternative of IPv4 protocol. IPv6 protocol has many features for example the expanded addressing capability, auto-configuration mechanism, simplification of the header format, improved support for extensions and options, extensions for authentication and privacy, flow labeling capability and so on. But many security holes of IPv6 are being reported together with the features as mentioned above. This paper suggests the algorithm to solve the security hole caused by a routing header. Routing header is a kind of extension headers of IPv6 and is used by an IPv6 source to list one or more intermediate nodes to be visited on the way to a packet's destination. But routing header has the security hole that an attacker can detour the access list of security system, for example firewall, and then he can access the protected internal system by using routing header
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信