IPv6 Security and Forensics

Vincent Nicolls, Nhien An Le-Khac, Lei Chen, Mark Scanlon

Research output: Contribution to book or proceedingChapter

5 Scopus citations

Abstract

IPv4 is the historical addressing protocol used for all devices connected worldwide. It has survived for over 30 years and has been an integral part of the Internet revolution. However, due to its limitation, IPv4 is being replacing by IPv6. Today, IPv6 is more and more widely used on the Internet. On the other hand, criminals are also well aware of the introduction of IPv6. They are continuously seeking new methods to make profit, hiding their activities, infiltrate or exfiltrate important data from companies. The introduction of this new protocol may provide savvy cybercriminals more opportunities to discover new system vulnerabilities and exploit them. To date, there is little research on IPv6 security and forensics in the literature. In this paper, we look at different types of IPv6 attacks and we present a new approach to investigate IPv6 network attack with case studies.

Original languageAmerican English
Title of host publicationProceedings of the IEEE International Conference on Innovative Computing Technology
DOIs
StatePublished - Aug 24 2016

Keywords

  • Forensics
  • IPv6
  • Security

DC Disciplines

  • Computer Sciences

Fingerprint

Dive into the research topics of 'IPv6 Security and Forensics'. Together they form a unique fingerprint.

Cite this