Reconnaissance attack on IPv6 to IPv4 tunneling

Nazrulazhar Bahama, Anton Satria Prabuwono, Teddy Mantoro

    Research output: Contribution to journalArticle

    Abstract

    Internet Protocol version 6 (IPv6) is created to occupy the insufficient current Internet addresses. Consequently this significant contribution offers huge number of Internet addresses. Besides, the security also has been improved to challenge today threats in competent on IPv6 network. As alternative, an automatic tunneling was introduced along with other transition mechanisms to ensure smooth implementation on existing network. However, it's believed that the implementation of automatic tunneling has altered the form of the IPv4 threats. Then the gained information from this mechanism is exploited to attempt the target network. As a concern, this paper thoroughly describes on potential of reconnaissance attack reach through automatic tunneling named 6to4 Tunneling. The preference development tools and networking defense mechanism suite, is setup to conduct proposed attack method under 6to4 tunnel testbed environment. As a result, the attacking method is feasible to attempt and 6to4 tunnel showed their influence on the achievement of DoS attack in current internet.

    Original languageEnglish
    Pages (from-to)1-9
    Number of pages9
    JournalInternational Journal of Mobile Computing and Multimedia Communications
    Volume5
    Issue number1
    DOIs
    Publication statusPublished - Jan 2013

    Fingerprint

    Internet protocols
    Internet
    Tunnels
    Testbeds

    Keywords

    • 6to4 Tunneling
    • Dual stack
    • Internet protocol version 6 (ipv6)
    • Protocol version 4 (ipv4)
    • Protocol-41

    ASJC Scopus subject areas

    • Computer Networks and Communications

    Cite this

    Reconnaissance attack on IPv6 to IPv4 tunneling. / Bahama, Nazrulazhar; Prabuwono, Anton Satria; Mantoro, Teddy.

    In: International Journal of Mobile Computing and Multimedia Communications, Vol. 5, No. 1, 01.2013, p. 1-9.

    Research output: Contribution to journalArticle

    Bahama, Nazrulazhar ; Prabuwono, Anton Satria ; Mantoro, Teddy. / Reconnaissance attack on IPv6 to IPv4 tunneling. In: International Journal of Mobile Computing and Multimedia Communications. 2013 ; Vol. 5, No. 1. pp. 1-9.
    @article{3774480253304e3b8415b2c0f9deb604,
    title = "Reconnaissance attack on IPv6 to IPv4 tunneling",
    abstract = "Internet Protocol version 6 (IPv6) is created to occupy the insufficient current Internet addresses. Consequently this significant contribution offers huge number of Internet addresses. Besides, the security also has been improved to challenge today threats in competent on IPv6 network. As alternative, an automatic tunneling was introduced along with other transition mechanisms to ensure smooth implementation on existing network. However, it's believed that the implementation of automatic tunneling has altered the form of the IPv4 threats. Then the gained information from this mechanism is exploited to attempt the target network. As a concern, this paper thoroughly describes on potential of reconnaissance attack reach through automatic tunneling named 6to4 Tunneling. The preference development tools and networking defense mechanism suite, is setup to conduct proposed attack method under 6to4 tunnel testbed environment. As a result, the attacking method is feasible to attempt and 6to4 tunnel showed their influence on the achievement of DoS attack in current internet.",
    keywords = "6to4 Tunneling, Dual stack, Internet protocol version 6 (ipv6), Protocol version 4 (ipv4), Protocol-41",
    author = "Nazrulazhar Bahama and Prabuwono, {Anton Satria} and Teddy Mantoro",
    year = "2013",
    month = "1",
    doi = "10.4018/jmcmc.2013010101",
    language = "English",
    volume = "5",
    pages = "1--9",
    journal = "International Journal of Mobile Computing and Multimedia Communications",
    issn = "1937-9412",
    publisher = "IGI Global Publishing",
    number = "1",

    }

    TY - JOUR

    T1 - Reconnaissance attack on IPv6 to IPv4 tunneling

    AU - Bahama, Nazrulazhar

    AU - Prabuwono, Anton Satria

    AU - Mantoro, Teddy

    PY - 2013/1

    Y1 - 2013/1

    N2 - Internet Protocol version 6 (IPv6) is created to occupy the insufficient current Internet addresses. Consequently this significant contribution offers huge number of Internet addresses. Besides, the security also has been improved to challenge today threats in competent on IPv6 network. As alternative, an automatic tunneling was introduced along with other transition mechanisms to ensure smooth implementation on existing network. However, it's believed that the implementation of automatic tunneling has altered the form of the IPv4 threats. Then the gained information from this mechanism is exploited to attempt the target network. As a concern, this paper thoroughly describes on potential of reconnaissance attack reach through automatic tunneling named 6to4 Tunneling. The preference development tools and networking defense mechanism suite, is setup to conduct proposed attack method under 6to4 tunnel testbed environment. As a result, the attacking method is feasible to attempt and 6to4 tunnel showed their influence on the achievement of DoS attack in current internet.

    AB - Internet Protocol version 6 (IPv6) is created to occupy the insufficient current Internet addresses. Consequently this significant contribution offers huge number of Internet addresses. Besides, the security also has been improved to challenge today threats in competent on IPv6 network. As alternative, an automatic tunneling was introduced along with other transition mechanisms to ensure smooth implementation on existing network. However, it's believed that the implementation of automatic tunneling has altered the form of the IPv4 threats. Then the gained information from this mechanism is exploited to attempt the target network. As a concern, this paper thoroughly describes on potential of reconnaissance attack reach through automatic tunneling named 6to4 Tunneling. The preference development tools and networking defense mechanism suite, is setup to conduct proposed attack method under 6to4 tunnel testbed environment. As a result, the attacking method is feasible to attempt and 6to4 tunnel showed their influence on the achievement of DoS attack in current internet.

    KW - 6to4 Tunneling

    KW - Dual stack

    KW - Internet protocol version 6 (ipv6)

    KW - Protocol version 4 (ipv4)

    KW - Protocol-41

    UR - http://www.scopus.com/inward/record.url?scp=84880655148&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=84880655148&partnerID=8YFLogxK

    U2 - 10.4018/jmcmc.2013010101

    DO - 10.4018/jmcmc.2013010101

    M3 - Article

    VL - 5

    SP - 1

    EP - 9

    JO - International Journal of Mobile Computing and Multimedia Communications

    JF - International Journal of Mobile Computing and Multimedia Communications

    SN - 1937-9412

    IS - 1

    ER -