Font Size: a A A

Research Of Assessment Techonlogy And Implement Of System For IPv6Network’s Security

Posted on:2015-03-21Degree:MasterType:Thesis
Country:ChinaCandidate:T ZhangFull Text:PDF
GTID:2298330467462326Subject:Information security
Abstract/Summary:PDF Full Text Request
With the development of Internet information technology, more and more users join in the Internet, which makes the already scarce IPv4addresses become more scarce. Therefore, the trend of the deployment of IPv6network in large area has become more and more obvious for solving the shortage of IPv4network’s address. However, technology research for IPv6network’s security couldn’t keep up with the pace of the times, and the traditional assessment technology for IPv4network’s safety is unable to replicate the IPv6network. Therefore, the research about problems and security evaluation technology on IPv6network has become newer topic. The research has found that Japan, Europe, American has conducted the research on IPv6network’s security in the early90’s. At the same time, as the Internet developing country, China has kept up with the development of the IPv6network. For example, our country has regarded colleges and universities as the base for research and experiment for IPv6network.Based on IPv6network of colleges and universities, this paper studied the security evaluation technology on the IPv6network, including the penetration testing technology which has solved the IPv6network’s host finding problems and the design of penetration testing step, and the research of specific attack method on IPv6network which made us understand the unique vulnerability problems on IPv6network. This paper studied the attack grap on IPv6network which has solved the automatic generation of IPv6network’s attack graph, and the method of evaluation for IPv6network’s security in order to solve the IPv6network’s evaluation and the problems of risk value calculation. Finally, this paper has displayed IPv6network’s security situation on the institutional level, regional level, the IPv6business system level and the threat vulnerability level.In practice, in order to verify the reliability of safety assessment methods, this paper designed a demo system for the process of IPv6network’s security evaluation which contained the penetration testing module, the storage for the base of IPv6network’s weakness knowledge, the automatic generation of IPv6network’s attack graph and safety assessment report. To observe the vulnerability information situation of IPv6network, this paper designed the module for analysis and display about IPv6network’s security situation. Through relying on the evaluation of the weakness of the knowledge base, the system can reveal the automated assessment of situation for IPv6network’s security.
Keywords/Search Tags:attack graph for IPv6network, penetration testing, evaluation method, evaluation system, security situation
PDF Full Text Request
Related items