期刊文献+

IPv6网络中的嗅探威胁及预防机制

Sniffing Threat and Practices in IPv6 Networks
在线阅读 下载PDF
导出
摘要 目的为企业构建可信、可管、可控、安全的IPv6网络,加强IPv6网络的安全性,尤其是避免IPv6网络中的嗅探威胁.方法通过建立IPv6网络的实验环境,分析传统IPv4网络中的网络嗅探技术,结合IPv6网络协议的特点,重点介绍了来源于IPv6网络中的嗅探威胁,以及这些威胁给实施IPV6网络带来的新挑战.结果提出了在设计基于IPv6协议的互联网络过程中,为避免嗅探威胁应使用伪随机地址和互联网进行通信的预防机制及实施策略.结论给出实施IPv6网络的技术建议.实验证明理想的方法是使用MAC地址扩展的静态地址用于内部通信技术等对IPv6网络的安全控制是有效的. NGI(Next Generation Internet) based on IPv6 protocol is becoming more and more popularization. As we know, IPv6 protocol suite is the same as vulnerable to a variety of attacks. IPv6 security is in many ways the same as IPv4 security. The basic mechanisms for transporting packets across the network stay mostly unchanged, and the upperlayer protocols that transport the actual application data are mostly unaffected. This paper illustrates sniffing threat against IPv4 and then compares how the threat might influence an IPv6 networks. This is prefaced by a brief overview of current practices around the design of an IPv4 Internet edge network and then followed by a review of how that IPv4 edge network needs to evolve in order to secure the addition of IPv6. As IPv6 security is a large and complex subject, and also, IPv6 network is still at the very beginning stage and has not been fully examined in fact, This paper focus on the security requirements of medium edge networks.
出处 《沈阳建筑大学学报(自然科学版)》 EI CAS 2006年第5期852-855,共4页 Journal of Shenyang Jianzhu University:Natural Science
基金 国家发展与改革委员会CNGI项目(CNGI-04-15-7A)
关键词 嗅探威胁 预防机制 IPV6网络 网络安全 sniffing threat practice IPv6 network network security
  • 相关文献

参考文献8

二级参考文献55

  • 1赵海雁,陈立潮,叶树华.基于Windows的网络监听技术在局域网中的实现[J].计算机工程,2004,30(22):117-118. 被引量:7
  • 2张洋.基于局域网的嗅探器发现技术研究[J].微计算机信息,2005,21(11X):33-34. 被引量:3
  • 3Floyd S. High-Speed TCP for large congestion windows. RFC3649, 2003.
  • 4DataTAG. http://datatag.web.cern.ch/datatag/networking.html
  • 5Corson MS. Internet-Based mobile ad hoc networking. IEEE Internet Computing, 1999. 63-70.
  • 6Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor network: A survey. Computer Networks, 2002,38:393-422.
  • 7Estrin D, Govindan R, Heidemann J, Kumar S. Next century challenges: Scalable coordinate in sensor network. In: Proc. of the 5th ACM/IEEE Int'l Conf. on Mobile Computing and Networking. 1999. 263-270.
  • 8Saltzer H, Reed DP, Clark D. End to end argument in system design. ACM Trans. on Computing System, 1984,2(4):277-288.
  • 9Tennenhouse DL, Wetherall D. Towards an active network architecture. Computer Communication Review, 1996,26(2):21-28.
  • 10Yemini Y, Silva S. Towards programmable networks. In: Proc. of the IFIP/IEEE Int'l Workshop on Distributed Systems:Operations and Management. 1996.

共引文献135

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部