{"title":"IPv4到IPv6转换的安全机制","authors":"A. Taib, R. Budiarto","doi":"10.1109/SCORED.2007.4451365","DOIUrl":null,"url":null,"abstract":"Transition from IPv4 to IPv6 has been made possible through various transition mechanisms, categorized as dual-stack, tunneling and translation. However, period of transition may take years to complete which both protocols will coexist due to Internet services deployed are widely in IPv4. So, a successful IPv6 transition is depended on the compatibility with the large installed base of IPv4 hosts and routers, as well as maintaining security of the network from potential threats and vulnerabilities of both Internet protocols. This paper classifies potential security issues in the transition period and identifies prevention mechanisms to the problems identified. As dual-stacked host or network is the most simple IPv6 deployment any enterprise can settle for now, this paper focuses on possible implementation of distributed firewall in a dual-stacked environment which involves packet filtering at the edge router as well as the host-based firewall.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Security Mechanisms for the IPv4 to IPv6 Transition\",\"authors\":\"A. Taib, R. Budiarto\",\"doi\":\"10.1109/SCORED.2007.4451365\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Transition from IPv4 to IPv6 has been made possible through various transition mechanisms, categorized as dual-stack, tunneling and translation. However, period of transition may take years to complete which both protocols will coexist due to Internet services deployed are widely in IPv4. So, a successful IPv6 transition is depended on the compatibility with the large installed base of IPv4 hosts and routers, as well as maintaining security of the network from potential threats and vulnerabilities of both Internet protocols. This paper classifies potential security issues in the transition period and identifies prevention mechanisms to the problems identified. As dual-stacked host or network is the most simple IPv6 deployment any enterprise can settle for now, this paper focuses on possible implementation of distributed firewall in a dual-stacked environment which involves packet filtering at the edge router as well as the host-based firewall.\",\"PeriodicalId\":443652,\"journal\":{\"name\":\"2007 5th Student Conference on Research and Development\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 5th Student Conference on Research and Development\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SCORED.2007.4451365\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 5th Student Conference on Research and Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SCORED.2007.4451365","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Mechanisms for the IPv4 to IPv6 Transition
Transition from IPv4 to IPv6 has been made possible through various transition mechanisms, categorized as dual-stack, tunneling and translation. However, period of transition may take years to complete which both protocols will coexist due to Internet services deployed are widely in IPv4. So, a successful IPv6 transition is depended on the compatibility with the large installed base of IPv4 hosts and routers, as well as maintaining security of the network from potential threats and vulnerabilities of both Internet protocols. This paper classifies potential security issues in the transition period and identifies prevention mechanisms to the problems identified. As dual-stacked host or network is the most simple IPv6 deployment any enterprise can settle for now, this paper focuses on possible implementation of distributed firewall in a dual-stacked environment which involves packet filtering at the edge router as well as the host-based firewall.