...
首页> 外文期刊>Journal of computer sciences >ENHANCED ENCAPSULATED SECURITY PAYLOAD A NEW MECHANISM TO SECURE INTERNET PROTOCOL VERSION 6 OVER INTERNET PROTOCOL VERSION 4
【24h】

ENHANCED ENCAPSULATED SECURITY PAYLOAD A NEW MECHANISM TO SECURE INTERNET PROTOCOL VERSION 6 OVER INTERNET PROTOCOL VERSION 4

机译:增强的安全性有效载荷一种新的机制,可在Internet协议版本4上保护Internet协议版本6

获取原文
获取原文并翻译 | 示例
           

摘要

A considerable amount of time will be needed before each system in the Internet can convert from Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6). Three strategies have been proposed by the Internet Engineer Task Force (IETF) to help the transition from IPv4 to IPv6 which are dual stack, header translation and tunneling. Tunneling is used when two computers using IPv6 want to communicate with each other and the packet will travel through a region that uses IPv4. To pass through this region, IPv6 packet must be encapsulated in IPv4 packet to have an IPv4 address in order to make it IPv4 routing compatible. Internet Protocol security (IPsec) in transport mode carries the payload of the encapsulating packet as a plain data without any mean of protection. That is, two nodes using IPsec in transport mode to secure the tunnel can spoof the inner payload; the packet will be de-capsulated successfully and accepted. IETF mentioned this problem in many RFCs. According to RFC 3964 there is no simple way to prevent spoofing attack in IPv6 over IPv4 tunnel and longer term solutions would have to be deployed in both IPv4 and IPv6 networks to help identify the source of the attack, a total prevention is likely impossible. This study proposed a new spoofing defense mechanism based on IPsec's protocol Encapsulated Security Payload (ESP). ESP's padding area had been used to write the IPv6 source address of the encapsulated packet. Simulation is conducted based on two scenarios, one with spoofing attack and one without. The outcome proved that proposed mechanism has managed to eliminate spoofing threat in IPv6 over IPv4 tunnel.
机译:在Internet中的每个系统从Internet协议版本4(IPv4)转换为Internet协议版本6(IPv6)之前,将需要大量的时间。互联网工程师任务组(IETF)提出了三种策略,以帮助从IPv4过渡到IPv6:双栈,标头转换和隧道化。当使用IPv6的两台计算机希望相互通信并且数据包将通过使用IPv4的区域时,将使用隧道。为了通过该区域,必须将IPv6数据包封装在IPv4数据包中以具有IPv4地址,以使其与IPv4路由兼容。传输模式下的Internet协议安全性(IPsec)将封装数据包的有效载荷作为纯数据传输,而没有任何保护措施。也就是说,在传输模式下使用IPsec来保护隧道的两个节点可以欺骗内部有效负载。数据包将被成功解封装并被接受。 IETF在许多RFC中都提到了此问题。根据RFC 3964,没有简单的方法来防止IPv6上通过IPv4隧道进行的欺骗攻击,并且必须在IPv4和IPv6网络中都部署更长期的解决方案来帮助识别攻击的源头,因此完全的预防可能是不可能的。这项研究提出了一种新的基于IPsec协议封装的安全有效载荷(ESP)的欺骗防御机制。 ESP的填充区已用于写入封装数据包的IPv6源地址。仿真是基于两种情况进行的,一种是带有欺骗攻击的场景,另一种是没有欺骗攻击的场景。结果证明,所提出的机制已成功消除了IPv4隧道上IPv6中的欺骗威胁。

著录项

  • 来源
    《Journal of computer sciences》 |2014年第7期|1344-1354|共11页
  • 作者单位

    Research Center for Software Technology and Management, Network and Communication Technology Lab, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 UKM Bangi, Selangor, Malaysia;

    Research Center for Software Technology and Management, Network and Communication Technology Lab, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 UKM Bangi, Selangor, Malaysia;

    Research Center for Software Technology and Management, Network and Communication Technology Lab, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 UKM Bangi, Selangor, Malaysia;

    Research Center for Software Technology and Management, Network and Communication Technology Lab, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 UKM Bangi, Selangor, Malaysia;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    IPv6; IPsec; ESP;

    机译:IPv6;IPsec;静电除尘器;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号