Securing IPv4 to IPv6 tunnel from neighbor discovery attack
dc.contributor.author | Mohammed Yousef, Mohammed Ghaleb | |
dc.date.accessioned | 2016-11-07T02:05:16Z | |
dc.date.available | 2016-11-07T02:05:16Z | |
dc.date.issued | 2008-06 | |
dc.description.abstract | The Neighbor Discovery (ND) protocol is very important in any networks because it can provide IP auto-configuration address resolution and also discover other nodes on the link, determine their link-layer addresses to find routers, and to maintain accessible information about paths to active neighbors. However, a malicious user can make connections between hosts of local area networks (LAN) and generate useless ND protocol messages by sending Neighbor Solicitation using a spoofed source link-layer address, and a Neighbor Advertisement with a spoofed target linklayer address. If the spoofed link-layer address is valid and the attacker responds to the unicast Neighbor Solicitation messages sent as part of the Neighbor Unreachability Detection, packets will continue to be redirected. In this thesis we propose a new mechanism which involves adding a new field in the authentication header called the secret field for the purpose of protecting from only ND attack, and designing a new algorithm called the SNFunction to digitally signature and hide the secret number field's value. We will also use a public key to encrypt and a private key to decrypt in the SN field during its transmission in the network to ensure that non that the forgery of ND packets is thwarted. | en_US |
dc.identifier.uri | http://hdl.handle.net/123456789/3003 | |
dc.subject | The Neighbor Discovery (ND) protocol | en_US |
dc.subject | can provide IP auto-configuration address resolution | en_US |
dc.title | Securing IPv4 to IPv6 tunnel from neighbor discovery attack | en_US |
dc.type | Thesis | en_US |
Files
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: