[PDF][PDF] Challenges and Mitigation Strategies for Transition from IPv4 Network to Virtualized Next-Generation IPv6 Network.

Z Ashraf, A Sohail, SA Latif, A Hameed… - Int. Arab J. Inf. Technol …, 2023 - ccis2k.org
The rapid proliferation of the Internet has exhausted Internet Protocol version 4 (IPv4)
addresses offered by Internet Assigned Number Authority (IANA). The new version of the IP …

Analysis of the security challenges facing the DS-Lite IPv6 transition technology

A Al-Azzawi, G Lencse - Electronics, 2023 - mdpi.com
This paper focuses on one of the most prominent IPv6 transition technologies named DS-
Lite (Dual-Stack Lite). The aim was to analyze the security threats to which this technology …

An investigation into teredo and 6to4 transition mechanisms: Traffic analysis

M Elich, P Velan, T Jirsik… - 38th Annual IEEE …, 2013 - ieeexplore.ieee.org
The exhaustion of IPv4 address space increases pressure on network operators and content
providers to continue the transition to IPv6. The IPv6 transition mechanisms such as Teredo …

Controlled and secure access to promote the industrial Internet of Things

MA Marquez, RS Herrera, A Mejías, F Esquembre… - IEEE …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) aims at facilitating access to all devices that are connected to the
internet, both wired and wireless. This scenario can initially seem interesting. Nevertheless …

[PDF][PDF] Routing loop attacks using IPv6 tunnels

GNM Arov - 3 USENIX Conf. Offensive Technol., 2009 - usenix.org
IPv6 is the future network layer protocol for the Internet. Since it is not compatible with its
predecessor, some interoperability mechanisms were designed. An important category of …

[PDF][PDF] Automatic nonlinear memory power modelling

E Schmidt, G Jochens, L Kruse, F Theeuwen… - Proceedings of the …, 2001 - Citeseer
Power estimation and optimization is an increasingly important issue in IC design. The
memory subsystem is a significant aspect, since memory power can dominate total system …

On the effectiveness of IP-routable entire-packet encryption service over public networks (november 2018)

R Tennekoon, J Wijekoon, H Nishi - IEEE Access, 2018 - ieeexplore.ieee.org
The Internet is an unsecured public network accessed by approximately half of the world
population. There are several techniques, such as cryptography, end-to-end encryption, and …

Cyber Situation Awareness via IP Flow Monitoring

T Jirsík - 2019 - is.muni.cz
Anotace Tato dizertační práce vylepšuje možnosti situačního povědomí v kybernetické
bezpečností výzkumem nových metod pro vnímání a porozumění počítačových sítí. V rámci …

RFC 6981: A Framework for IP and MPLS Fast Reroute Using Not-Via Addresses

S Bryant, S Previdi, M Shand - 2013 - dl.acm.org
This document presents an illustrative framework for providing fast reroute in an IP or MPLS
network through encapsulation and forwarding to" not-via" addresses. The general …

Characterizing the ipv6 security landscape by large-scale measurements

L Hendriks, A Sperotto, A Pras - … Configuration and Security: 9th IFIP WG …, 2015 - Springer
Networks are transitioning from IP version 4 to the new version 6. Fundamental differences
in the protocols introduce new security challenges with varying levels of evidence. As …