Font Size: a A A

Ipv6 Environment, Network Communication And Counterfeiting (the Phishing) Defense Technology Research

Posted on:2008-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:Y G ZouFull Text:PDF
GTID:2208360212979024Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet and the growth of network scale, the IPv4 network has been unable to adapt to the current development of the Internet. The application of IPv6 has become an inevitable trend, as IPv6 will also show its great advantage in the network. However, the transition from IPv4 to IPv6 will not be accomplished overnight. IPv4 and IPv6 will coexist for a long time in the network. With the gradual application of IPv6, various problems will inevitably arise, particularly network security. The e-commerce and cyberbank, as a convenient means of consumption and investment, have been the promptest application field of new network technologies, so many people like this way. However, as network popularizing and the protocal changing, new network steal technology also is appearing. Phishing attacks, which emerged since 2003, have become one of the most severe security threats on the Internet. Phishing has caused heavy losses for financial institutions and common consumers. It has blocked the develop of e-banking and e-commerce. By imitating famas banks and well-known business websites, phishers can make 5% of the recipients to respond to them.First, this paper introduces new characters and technical criterions of IPv6 protocal, analyzes and compares the similarities and differences of IPv4 and IPv6 protocols, and then studies on the transition problems from IPv4 to IPv6. It emphasizes on analyzing several kinds of relatively mature technologies: Dual Stack, Tunnel Technology, and NAT-PT. Subsequently, the paper makes the emphasis on the technology of the communication between IPv6 networks and the communication between IPv4 and the IPv6 network. In the late-transition, IPv4 addresses that can be used effectively are less, and NAT-PT will play a key role. So we stress study on NAT-PT.HTTP, which is the most important Application Layer protocol of TCP/IP, is the basis of web technologies. Currently, e-banks and e-commerce are based on web techlogies. Therefore, we emphasize on NAT-PT technology, design and realize an IPv4/IPv6 translation gateway which supports HTTP protocal. Then we study Phishing attacks and defense technologies on the translation gateway.Studying on anti-phishing technology is the most important part of this paper. This paper summarizes the popular phishing attacks, phishing attack behaviors and the losses. Then we describe the typical phishing attacks and establish attack...
Keywords/Search Tags:IPv6, network security, Phishing, HTTP, SSL/TLS, NAT-PT
PDF Full Text Request
Related items