Font Size: a A A

Study On The Key Technologies And Network Security Of IPv6

Posted on:2006-11-05Degree:MasterType:Thesis
Country:ChinaCandidate:Z S HanFull Text:PDF
GTID:2168360152982383Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the gradual introduction of IPv6 into the various platforms by the internet manufacturers and developers, the two internet protocol, IPv4 and IPv6 will coexist for a number of years during a transition period. This paper details the RFC of IPv6 designed by the IETF, discusses the IP and header format, and analysis the main differences between IPv6 and IPv4.How to complete the transition from IPv4 to IPv6 is one of the important problems. This paper mainly discusses the popular technologies, including the tunneling, dual stack, SOCKS64, transport-layer relaying, ALG and NAT/PT.With the introduction of IPv6, the security of the internet protocol is enhanced, which is completed by the IPSec protocol. This paper details the principal of the IPSec protocol, and analysis the present IPSec protocol set. It is focused on the concept and the function of the SA.The main works of the paper are summarized as follows:1.Construct the IPv6 environment, and develop the attack integration platform based on IPv6;2.Simulate the attack affairs under the IPv6 environment as comprehensive as possible;3.Construct the feature database about the attack affairs, Combing the obtained attack features;4.Implement the invasion detection which combines the network detecting collections and the obtained results, and supports the IPv4 and IPv6 protocol at the same time.Finally, this paper briefs the applications of IPv6 in WINDOWS.
Keywords/Search Tags:IPv6, IPv4, Tunneling, NAT/PT, IPsec,AH,ESP,SA, IDS, Attack affairs
PDF Full Text Request
Related items