Font Size: a A A

Ipv6 Network Environment, Trojan Key Technology Research And Implementation,

Posted on:2011-12-15Degree:MasterType:Thesis
Country:ChinaCandidate:X YunFull Text:PDF
GTID:2208360308975816Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As the core of NGN (Next Generation Network), IPv6 protocol makes lots of modifications to IPv4, including the enhancement of Security, Auto-Configuration, Mobility etc, and can resolve the problem of address shortage in IPv4. However, some new problems are also arisen in network attack of IPv6. It means that the traditional attack methods can not work well in IPv6 network, especially to the common network control tools----Trojan horse. The reason is that the structure of address is changed in IPv6. Then, to solve this problem, Trojan horse must correspondingly be changed in two aspects: its functions and its communication protocols. The contributions of this paper are outlined as follows:1. The local activity entity discovery technology. This paper first gives a sign of activity entity Defining local activity entity, critically analyzes the multi-cast mechanism in IPv6 protocol and the neighbor request datagram, and proposes a technique to discover the local link activity entity and the local site router, and a router discovery technique based on multicast and the address prefix guess technique so as to settle the activity entity detection in the huge address space. Its efficiency and the covertness are much better than the conventional one.2. The covert communication. This paper stars to express the concept of covert communication. Then studying all kinds of channel mechanisms in IPv6 protocols, it designs the covert communication model by ISATAP tunnel in IPv6 protocol, and then makes analyses about its covertness and shortage. Due to the poor covertness of Trojan tool in ISATAP, another model is designed, which integrates ISATAP and 6to4 tunnels. Afterwards, its principle and the Covert policy are given, resolving the problem that the traditional Trojan can't work in IPV6 and designing a Convert communication model based on IPV4/IPV6 protocol in order to improve the ability to Trojan's counter track.3. Designing and implementing the Trojan platform in IPv6 and IPv6/IPv4 coexistence network, based on the local link activity entity discovery and the local site router discovery. Testing the main functions of this platform and results show its efficacy...
Keywords/Search Tags:multicast, neighbor solicitation, ISATAP channel, mix channel, Trojan platform
PDF Full Text Request
Related items