Research Article
In-depth analysis of IPv6 security posture
@INPROCEEDINGS{10.4108/ICST.COLLABORATECOM2009.8393, author={Abdur Rahim Choudhary}, title={In-depth analysis of IPv6 security posture}, proceedings={The Fourth International Workshop on Trusted Collaboration}, publisher={IEEE}, proceedings_a={TRUSTCOL}, year={2009}, month={12}, keywords={Explosions IP networks Internet Joining processes North America Pressing Protocols Radiofrequency identification Security Testing}, doi={10.4108/ICST.COLLABORATECOM2009.8393} }
- Abdur Rahim Choudhary
Year: 2009
In-depth analysis of IPv6 security posture
TRUSTCOL
ICST
DOI: 10.4108/ICST.COLLABORATECOM2009.8393
Abstract
The version 6 of Internet Protocol (IPv6) is being gradually deployed worldwide. This paper analyzes the security of IPv6 protocol. is the analysis concludes that serious security vulnerabilities exist that are IPv6 specific. Therefore additional security measures are needed and more capable security management tools are required in IPv6 networks in order to achieve a security posture at parity with that of the IPv4 networks.
Copyright © 2009–2024 ICST