Return to search

Implementation and analysis of a threat model for IPv6 host autoconfiguration

IPv6, the successor of IPv4, introduces the stateless autoconfiguration feature as a convenient alternative to the Dynamic Host Configuration Protocol (DHCP). However, the security implications of this new approach have only been discussed at the conceptual level. This thesis research develops software based on the open-source packet capture library Jpcap to capture and build appropriate ICMPv6 autoconfiguration messages. The developed Java software is used to implement two DoS threats to the IPv6 autoconfiguration procedure in a laboratory IPv6 network. The results indicate that these threats are real and further studies are required to identify suitable countermeasures. During this work compliance defects are also identified for the Linux Operating System's IPv6 implementation.

Identiferoai:union.ndltd.org:nps.edu/oai:calhoun.nps.edu:10945/2547
Date09 1900
CreatorsChozos, Savvas
ContributorsXie, Geoffrey, Gibson, John, Naval Postgraduate School (U.S.)., Department of Computer Science
PublisherMonterey, California. Naval Postgraduate School
Source SetsNaval Postgraduate School
Detected LanguageEnglish
TypeThesis
Formatxiv, 89 p. : ill. ;, application/pdf
RightsApproved for public release, distribution unlimited, This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, may not be copyrighted.

Page generated in 0.0017 seconds