Loading

Investigating Security Issues and Preventive Mechanisms in Ipv6 Deployment
J. Sebastian Nixon1, Megersa Amenu2
1J. Sebastian Nixon*, School of Informatics, Wolaita Sodo University, Ethiopia.
2Megersa Amenu, School of Informatics, Wolaita Sodo University, Ethiopia. 
Manuscript received on January 13, 2022. | Revised Manuscript received on February 01, 2022. | Manuscript published on February 28, 2022. | PP: 1-20 | Volume-9, Issue-2, February 2022. | Retrieval Number: 100.1/ijaent.B0466019222 | DOI: 10.35940/ijaent.B0466.029222
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Internet Protocols are utilized to empower the communication between the computing devices in the computer networks. IPv6 offers additional address space and more noteworthy security than IPv4. The progress from IPv4 to IPv6 has been finished through three primary change systems: dual-stack, tunneling, and translation. The IPv6 progress relies upon the similarity with the enormous introduced base of IPv4 nodes and routers just as keeping up with the security of the network from possible threats and vulnerabilities of both Internet protocols. This research identifies potential security issues in the transition mechanisms and proposing prevention mechanisms to the problems identified. Dual-Stack & Tunneling mechanisms were completely implemented in this research work and the security test was based on dual-stack network. A simulation has been designed by using GNS3 and the penetration test by the THC-IPv6 toolkit. After the implementation of simulation, IPv6 in the dual-stack mechanism was identified as vulnerable to DoS via RA flooding and IPv6 fragmentation attacks that shown the IPv6 security problems. Therefore, IPv6 ACLs and RA guards were proposed in order to protect from flooding attacks and VFR should be configured to prevent IPv6 fragmentation. 
Keywords: Ipv4, Ipv6, Fragmentation, Ra Flooding, Security.
Scope of the Article: Security and privacy