Study on attacking and defending techniques in IPv6 networks

Although widely deployed in recent years, the IPv6 protocols still have many security problems, especially the Man-In-The-Middle (MITM) Attack in IPv6 Local Area Network. This paper presents an IPv6 MITM Attack test system to help users aware the security risks, and then design a defending tool using DNSSEC to avoid session hijack attack in IPv6 Networks.

[1]  Matt Crawford,et al.  Transmission of IPv6 Packets over Ethernet Networks , 1998, RFC.

[2]  Satyajayant Misra,et al.  CluRoL: Clustering based Robust Localization in Wireless Sensor Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[3]  Stephen E. Deering,et al.  Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) , 1995, RFC.

[4]  Liu Wu,et al.  Study on Anti-Attack Model for Low-Latency Anonymous Communication System , 2012, 2012 Second International Conference on Cloud and Green Computing.

[5]  Thomas Narten,et al.  Neighbor Discovery for IP Version 6 (IPv6) , 1996, RFC.

[6]  Wu Liu,et al.  Mobile Intelligent Terminal Based Remote Monitoring and Management System , 2012, 2012 Third Cybercrime and Trustworthy Computing Workshop.

[7]  Donald E. Eastlake,et al.  Domain Name System Security Extensions , 1997, RFC.

[8]  Stephen E. Deering,et al.  Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification , 2006, RFC.

[9]  Sarvesh Bhardwaj,et al.  Secure and Robust Localization in a Wireless Ad Hoc Environment , 2009, IEEE Transactions on Vehicular Technology.

[10]  Wu Jian-ping,et al.  H6Proxy: ICMPv6 Weakness Analysis and Implementation of IPv6 Attacking Test Proxy , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.

[11]  Wu Liu,et al.  A Data Security Protection Mechanism Based on Transparent Biometric Authentication for Mobile Intelligent Terminals , 2012, 2012 Third Cybercrime and Trustworthy Computing Workshop.