Comparisons analysis of security vulnerabilities for security enforcement in IPv4/IPv6

Hayoung Oh, Kijoon Chae, Hyo Chan Bang, Jung Chan Na

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

When IPv6 were defined, it was assumed that the local link would consist of mutually trusting nodes. Even though the actual link may still be somewhat protected with layer2 security, some of the nodes on the link nay be untrustworthy because of leading to various kinds of access stealing, DoS, and traffic snooping attacks. In this paper we suggest comparisons analysis of security vulnerabilities for security enforcement in IPv4 and IPv6.

Original languageEnglish
Title of host publication8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings
Pages1583-1585
Number of pages3
StatePublished - 2006
Event8th International Conference Advanced Communication Technology, ICACT 2006 - Phoenix Park, Korea, Republic of
Duration: 20 Feb 200622 Feb 2006

Publication series

Name8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings
Volume3

Conference

Conference8th International Conference Advanced Communication Technology, ICACT 2006
Country/TerritoryKorea, Republic of
CityPhoenix Park
Period20/02/0622/02/06

Keywords

  • Category of attacks
  • IPv4/IPv6
  • Security

Fingerprint

Dive into the research topics of 'Comparisons analysis of security vulnerabilities for security enforcement in IPv4/IPv6'. Together they form a unique fingerprint.

Cite this