Securing IPv4 to IPv6 tunnel from neighbor discovery attack

dc.contributor.authorMohammed Yousef, Mohammed Ghaleb
dc.date.accessioned2016-11-07T02:05:16Z
dc.date.available2016-11-07T02:05:16Z
dc.date.issued2008-06
dc.description.abstractThe Neighbor Discovery (ND) protocol is very important in any networks because it can provide IP auto-configuration address resolution and also discover other nodes on the link, determine their link-layer addresses to find routers, and to maintain accessible information about paths to active neighbors. However, a malicious user can make connections between hosts of local area networks (LAN) and generate useless ND protocol messages by sending Neighbor Solicitation using a spoofed source link-layer address, and a Neighbor Advertisement with a spoofed target linklayer address. If the spoofed link-layer address is valid and the attacker responds to the unicast Neighbor Solicitation messages sent as part of the Neighbor Unreachability Detection, packets will continue to be redirected. In this thesis we propose a new mechanism which involves adding a new field in the authentication header called the secret field for the purpose of protecting from only ND attack, and designing a new algorithm called the SNFunction to digitally signature and hide the secret number field's value. We will also use a public key to encrypt and a private key to decrypt in the SN field during its transmission in the network to ensure that non that the forgery of ND packets is thwarted.en_US
dc.identifier.urihttp://hdl.handle.net/123456789/3003
dc.subjectThe Neighbor Discovery (ND) protocolen_US
dc.subjectcan provide IP auto-configuration address resolutionen_US
dc.titleSecuring IPv4 to IPv6 tunnel from neighbor discovery attacken_US
dc.typeThesisen_US
Files
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: