Font Size: a A A

Based On IPv6 Security Analysis And Research

Posted on:2007-10-28Degree:MasterType:Thesis
Country:ChinaCandidate:C LiuFull Text:PDF
GTID:2178360185959398Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The IPv6 network technology although already obtained the widespread utilization, it and IPv4 also had to coexist very long period of time. In this kind of situation, regarding the IPv4 and the IPv6 network coexistence, application and the transition question was still a research hot spot, especially in IPv6 management and security aspect.The IPv4 network to the IPv6 network transition in the safe application question is researched thoroughly in this paper. First of all, single plane under IPv6 environment disposition and the IPv6 experiment network theory is built through the existing network, the model has carried on the realization in the experimental process using Tunnel Broke (TB), it causes the IPv4 user and the IPv6 user may connect in Internet, at the same time has facilitated how to manage the tunnel information.Secondly, through the analysis of the problem on the tests loses Bao Lvtai, the massive materials consult, the analysis and the research had been carried on, the causes to lose Bao Lvtai the big 3 factors had been discovered: (1) exsists the sniffer to the information grouping interception in the network; (2) causes the destination to IP and the MAC address deceit not to be possible to arrive; (3) the discovery of MTU way. Through the analysis and the research above 3 questions, the big reason of causing to lose Bao Lvtai is discovered and the corresponding solutions are proposed.Finally, how to prevente the invasion in the IPv4 and in the IPv6 environment has been thorough analized and the researched, based on the Snort model foundation, has carried on the 3rd and the 4th analysis work through the upper formation agreement to IPV4 and the IPv6 head.Through the analysis, the research and the experiment of these questions, some technologies had been correspondingly used. Eg. The Tunnel Broke model and Tunnel Server technology are used in tunnel management. The against the sniffer and the IP address deceit related technology are used in used in the solution package of loss rate too large, and the...
Keywords/Search Tags:IPv6, Tunnel, Dual stack, NAT-PT, Tunnel Broker, MTU
PDF Full Text Request
Related items