{"title":"Protection Algorithm against security holes of IPv6 routing header","authors":"Jae-Deok Lim, Youngki Kim","doi":"10.1109/ICACT.2006.206388","DOIUrl":null,"url":null,"abstract":"Current Internet is based on IPv4 protocol. However the limitation of IPv4 protocol such as a lack of address can put obstacles to continuous progress of Internet. IPv6 protocol is suggested and developed as an alternative of IPv4 protocol. IPv6 protocol has many features for example the expanded addressing capability, auto-configuration mechanism, simplification of the header format, improved support for extensions and options, extensions for authentication and privacy, flow labeling capability and so on. But many security holes of IPv6 are being reported together with the features as mentioned above. This paper suggests the algorithm to solve the security hole caused by a routing header. Routing header is a kind of extension headers of IPv6 and is used by an IPv6 source to list one or more intermediate nodes to be visited on the way to a packet's destination. But routing header has the security hole that an attacker can detour the access list of security system, for example firewall, and then he can access the protected internal system by using routing header","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 8th International Conference Advanced Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACT.2006.206388","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
Current Internet is based on IPv4 protocol. However the limitation of IPv4 protocol such as a lack of address can put obstacles to continuous progress of Internet. IPv6 protocol is suggested and developed as an alternative of IPv4 protocol. IPv6 protocol has many features for example the expanded addressing capability, auto-configuration mechanism, simplification of the header format, improved support for extensions and options, extensions for authentication and privacy, flow labeling capability and so on. But many security holes of IPv6 are being reported together with the features as mentioned above. This paper suggests the algorithm to solve the security hole caused by a routing header. Routing header is a kind of extension headers of IPv6 and is used by an IPv6 source to list one or more intermediate nodes to be visited on the way to a packet's destination. But routing header has the security hole that an attacker can detour the access list of security system, for example firewall, and then he can access the protected internal system by using routing header