[HTML][HTML] IPv6 rapid deployment on IPv4 infrastructures (6rd)--Protocol Specification

W Townsley, O Troan - 2010 - rfc-editor.org
RFC 5969: IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) -- Protocol Specification [RFC
Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Errata] [Info page] PROPOSED STANDARD Errata …

IPv4 address sharing mechanism classification and tradeoff analysis

N Škoberne, O Maennel, I Phillips… - IEEE/ACM …, 2013 - ieeexplore.ieee.org
The growth of the Internet has made IPv4 addresses a scarce resource. Due to slow IPv6
deployment, IANA-level IPv4 address exhaustion was reached before the world could …

{IPv6} security: Attacks and countermeasures in a nutshell

J Ullrich, K Krombholz, H Hobel, A Dabrowski… - 8th USENIX Workshop …, 2014 - usenix.org
The history of computers is full of underestimation: 640 kilobyte, 2-digit years, and 32-bit
Internet addresses. IPv6 was invented to overcome the latter as well as to revise other …

[PDF][PDF] A framework of features selection for ipv6 network attacks detection

M Zulkiflee, M Azmi, S Ahmad, S Sahib… - WSEAS Trans …, 2015 - researchgate.net
IPv6 technology introduced to solve problems in the previous IPv4 technology. New threats
were discovered due to the exploitation of flaws in IPv6 architecture design. There is a …

On mapping of address and port using translation

A Bhattacharjya, X Zhong… - International Journal of …, 2019 - inderscienceonline.com
Due to the shortage of IPv4 addresses, many hosts are currently assigned to a single IPv4
address by using one or a number of NAT devices. However, numerous NAT devices cannot …

[PDF][PDF] Thirteen years of Tor attacks

B Evers, J Hols, E Kula, J Schouten… - … , Delft University of …, 2016 - git.safemobile.org
Tor is the largest anonymous communication network. Recent papers discuss the
vulnerabilities of Tor's Onion Router design and question the effectiveness of Tor. These …

IPv6 rapid deployment in Taiwan academic network (TANet)

PK Chen, CW Lu, Q Wu - 2012 14th International Conference …, 2012 - ieeexplore.ieee.org
After the Internet Assigned Numbers Authority (IANA) allocated all the remaining IPv4
address blocks to Regional Internet Registries in February 2011, IPv6 became mandatory to …

[PDF][PDF] Haunted by Legacy: Discovering and Exploiting Vulnerable Tunnelling Hosts

A Beitis, M Vanhoef - Proceedings of the 34th USENIX Security … - papers.mathyvanhoef.com
This paper studies the prevalence and security impact of open tunnelling hosts on the
Internet. These hosts accept legacy or modern tunnelling traffic from any source. We first …

RFC 7526: Deprecating the Anycast Prefix for 6to4 Relay Routers

O Troan - 2015 - dl.acm.org
Experience with the 6to4 transition mechanism defined in RFC 3056 (" Connection of IPv6
Domains via IPv4 Clouds") has shown that the mechanism is unsuitable for widespread …

[PDF][PDF] A functional and performance-oriented comparison of transition mechanisms for internet transition from ipv4 to ipv6 protocol

N Skoberne - 2013 - core.ac.uk
I certify that I have obtained written permission from the copyright owner (s) to include the
above published material (s) in my thesis. I certify that the above material describes work I …