• Title/Summary/Keyword: IPv6 network

Search Result 466, Processing Time 0.03 seconds

Test of IPv6-based multicast video conferencing on Native IPv6 network and TEIN (순수 IPv6 망 및 TEIN을 통한 IPv6 기반의 멀티캐스트 화상회의 실험)

  • 인민교;이승윤;김형준
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.323-326
    • /
    • 2002
  • In this paper, we propose the new experimental using gif tunneling based on IPv4 and IPv6. HVIC developed by ETRI-SNU and vic, net by UCL in England were used during the tests. The networks used in this experiments are TEIN (TEIN:TransEurasia Information Network) that recently established between Korea and Europe and ATM-based IPv6 native network which connecting among ETRI, KOREN, SNU. We take following three scenarios into account. The one is the IPv6 tunneling based on IPv4, the other is IPv6 tunneling on IPv6 network, and the third is IPv6 native network based on ATM we propose the new experimental method using gif tunneling between IPv4 and IPv6.

  • PDF

The Design of IPv6 Traffic Analysis Tool for Detecting Network Attacks (네트워크 공격을 탐지하기 위한 IPv6 트래픽 분석 도구)

  • Oh, Seung-Hee;Oh, Jin-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.848-851
    • /
    • 2005
  • The BcN is applying from public networks to local networks and each terminal step by step until 2007. By IPv6 network introduction, IP address lack problem can be solved. However, the threats that network attacks of another method can be caused with new problem of network security in IPv6 networks. In this paper, we suggest the traffic analysis tool which analyze IPv6 traffic efficiently to detect/response network attack in IPv6 environment. The implemented IPv6 traffic analysis tool uses IPv6 header to analyze traffic and detect network attacks. Also, we also propose detection algorithm to detect network attacks in IPv6 networks.

  • PDF

Analysis for Security Vulnerabilities on DSTM Tunneling (DSTM 터널링 보안 취약점 분석)

  • Cho, Hyug-Hyun;Kim, Jeong-Wook;Noh, Bong-Nam
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.4
    • /
    • pp.215-221
    • /
    • 2007
  • IPv6 is a protocol to solve the address space limitation of IPv4 by IETF. Many transition mechanism to communicate between IPv4 and IPv6 in mixed IPv4/IPv6 network are proposed. DSTM tunneling is a mechanism that dual stack in IPv6 network is able to communicate with node in IPv4 network by dynamic allocating the IPv4 address. This mechanism supports the execution of IPv4 dependent application without modification at IPv6 network. In this paper, we explain the security vulnerability at DSTM network for DHCP attack, TEP attack, and source spoofing attack then describe the result of attacks.

  • PDF

Design and Implementation of Network Access Control based on IPv6 (IPv6 기반의 네트워크 접근제어 시스템 설계 및 구현)

  • Shin, HaeJoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6310-6316
    • /
    • 2014
  • The increase in the Internet and smart device users requires high-level network security. Network security consists of Web Firewall, Network Firewall, IPS, DDoS system, UTM (Unified Treat Management), VPN, NAC (Network Access Control), Wireless security, Mobile security, and Virtualization. Most network security solutions running on IPv4, and IPv6 network services are not sufficiently ready. Therefore, in this paper, this study designed and implemented important functions of Network Access Control (NAC), which include IPv6 host detection, isolation, blocking and domain assignment for the IPv6 network. In particular, domain assignment function makes 128 bits IPv6 address management easy. This system was implemented on a KISA IPv6 test-bed using well known devices. Finally, the test result showed that all IPv6 based wired and wireless devices were well-controlled (detection, blocking, isolation and domain assignment).

The IPv6 Router Design on Embedded Linux (임베디드 리눅스를 이용한 IPv6 라우터의 설계에 관한 연구)

  • 류재훈;김정태;류광렬
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.243-246
    • /
    • 2003
  • The design of router that converts IP packets from IPv4 network to IPv6 network using embedded Linux toolkit based on processor is presented. As an address transition platform, IPv6 module is transplanted to Linux using processor and the experiment was done with IPv4 and IPv6. In order to build the test network, it is constructed with Tunneling mechanism of IPv4 and IPv6 network. The packet value is obtained about 2$\mu$sec on average a 2 hops on the ICMP ping6.

  • PDF

IPv6 Migration, OSPFv3 Routing based on IPv6, and IPv4/IPv6 Dual-Stack Networks and IPv6 Network: Modeling, and Simulation (IPv6 이관, IPv6 기반의 OSPFv3 라우팅, IPv4/IPv6 듀얼 스택 네트워크와 IPv6 네트워크: 모델링, 시뮬레이션)

  • Kim, Jeong-Su
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.343-360
    • /
    • 2011
  • The objective of this paper is to analyze and characterize to simulate routing observations on end-to-end routing circuits and a ping experiment of a virtual network after modeling, such as IPv6 migration, an OSPFv3 routing experiment based on an IPv6 environment, and a ping experiment for IPv4/IPv6 dual-stack networks and IPv6 network for OSPFv3 routing using IPv6 planning and operations in an OPNET Modeler. IPv6 deployment based largely on the integrated wired and wireless network was one of the research tasks at hand. The previous studies' researchers recommended that future research work be done on the explicit features of both OSPFv3 and EIGRP protocols in the IPv4/IPv6 environment, and more research should be done to explore how to improve the end-to-end IPv6 performance. Also, most related work was performed with an IPv4 environment but lacked studies related to the OSPFv3 virtual network based on an end-to-end IPv6 environment. Hence, this research continues work in previous studies in analyzing IPv6 migration, an OSPFv3 routing experiment based on IPv6, and a ping experiment for IPv4/IPv6 dual-stack networks and IPv6 network for OSPFv3 routing. In the not too distant future, before enabling the default IPv6, it would help to understand network design and deployment based on an IPv6 environment through IPv6 planning and operations for the end-user perspective such as success or failure of connection on IPv6 migration, exploration of an OSPFv3 routing circuit based on an end-to-end IPv6 environment, and a ping experiment for IPv4/IPv6 dual-stack networks and IPv6 network for OSPFv3 routing. We were able to observe an optimal route for modeling of an end-to-end virtual network through simulation results as well as find what appeared to be a fast ping response time VC server to ensure Internet quality of service better than an HTTP server.

Integrated Security Management with MCGA in IPv6 Network (IPv6 네트워크 환경에서 MCGA를 고려한 통합적인 보안관리 방안)

  • Oh, Ha-Young;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.27-38
    • /
    • 2007
  • IPv6 has appeared for solving the address exhaustion of IPv4 and for guaranteeing the problems of security and QoS. It occurs the unexpected new attacks of IPv6 as well as the existing attacks of IPv4 because of the increasing address space to 128bits and the address hierarchies for efficient network management and additions of the new messages between nodes and routers like neighbor discovery and auto address configuration for the various comfortable services. For the successful transition from IPv4 to IPv6, we should get the secure compatibility between IPv4 hosts or routers working based on secure and systematic policy and IPv6. Network manager should design security technologies for efficient management in IPv4/IPv6 co-existence network and IPv6 network and security management framework designation. In this paper, we inspected the characteristics of IPv4 and IPv6, study on security requirement for efficient security management of various attacks, protocol, service in IPv4/IPv6 co-existence and IPv6 network, and finally suggest integrated solution about security vulnerability of IPv6 network in considering of analysis of IPv6 system, host and application, IPv6 characteristics, modified CGA(MCGA).

IPv6 Network Deployment and Service Development in Daedeok Innopolis (대덕특구 IPv6 네트워크 구축 방안 및 서비스 개발)

  • Joobum Kim;Seunghae Kim;Kwangho Kim;Kwangsub Ko;Wonhyuk Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1199-1202
    • /
    • 2008
  • 인터넷 이용의 폭발적인 성장에 힘입어 IPv4 주소가 고갈됨에 따라 향후 IPv6 주소로의 전환이 필요하다. 하지만 현재 IPv6 장비 도입 비용 및 보안시스템 등의 기술적인 문제와 IPv4 서비스와의 상호연계 문제 등으로 IPv6로의 전환에 어려움을 겪고 있다. 이에 공공부문 특히 우리나라 IT의 메카인 대덕연구개발특구에 IPv6 네트워크를 구축하고 특화서비스를 개발하여 성공적인 IPv6 전환 촉진 및 IPv6 이용을 활성화 하고자 한다. 이를 위해 본 논문에서는 IPv6 네트워크 전환 구축방안을 제시하고 이에 따른 특화서비스에 대하여 알아보고자 한다.

Hardware Design and Implementation of IPv6­-IPv4 Protocol Translator (IPv6­-IPv4 프로토콜 변환기의 하드웨어 설계 및 구현)

  • 이경렬;공인엽;이중렬;이정태
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.556-558
    • /
    • 2003
  • IPv6 도입 단계에서는 IPv4 Network와 IPv6 Network가 혼재하게 되는데, 이 때 IPv4 Network와 IPv6 Network 간의 통신을 가능하게 하는 IPv6­IPv4 프로토콜 변환기가 요구된다. 그러나 성능 분석 결과에 따르면, 기존에 구현된 프로토콜 변환기는 운영 체제를 기반으로 한 소프트웨어로 구현되어 있어서 Network 간의 모든 트래픽을 처리하기에는 성능 상의 한계가 있다. 이에 본 논문에서는 기존 소프트웨어 프로토콜 변환기의 성능 인자 분석 연구를 토대로 하여, 하드웨어 기반의 고성능 64Translator를 제안하였다. 64Translator는 하드웨어 TCP/IPv6와 TCP/IPv4를 내장하고 개선된 메모리 엑세스 방식을 사용함으로써 기존 구현 방식에 비해 성능을 개선하였다. 구현된 하드웨어 모듈에 대해서는 소프트웨어 시뮬레이션과 시험망상에서의 테스트를 수행함으로써 그 기능을 검증하였다.

  • PDF

A 4to6 DSTM Architecture Supporting Transparent Connections from IPv4 Hosts to IPv6 Hosts in Integrated IPv6/IPv4 Networks (IPv6/IPv4 통합망에서 IPv4 호스트로부터 IPv6 호스트로의 투명한 연결을 지원하는 4to6 DSTM 구조)

  • Park Eun-yong;Lee Jae-hwoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5B
    • /
    • pp.287-294
    • /
    • 2005
  • It is impossible to replace overnight the present Internet Protocol Version 4(IPv4)-based Internet with Internet Protocol Version 6(IPv6). These two protocols are expected to coexist for a number of years during the transition period. A number of transition mechanisms are proposed by Internet Engineering Task Force(IETF) Next Generation Transition Working Group(Ngtrans WG). However, most of them provide only the mechanism to initiate sessions from hosts within the IPv6 network to those within the IPv4 network, but do not support the initiation from IPv4 hosts to IPv6 ones. In this paper, we propose the IPv4-to-IPv6 Dual Stack Transition Mechanism(4to6 DSTM) which can operate even in the case that IPv4 clients in the IPv4 network initiate connections with dual stack servers in the IPv6 network.