Cyber scanning: a comprehensive survey

E Bou-Harb, M Debbabi, C Assi - Ieee communications surveys …, 2013 - ieeexplore.ieee.org
Cyber scanning refers to the task of probing enterprise networks or Internet wide services,
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …

[PDF][PDF] Proposed security mechanism for preventing fake router advertisement attack in IPv6 link-local network

MA Al-Shareeda, S Manickam… - Indones. J. Electr …, 2023 - pdfs.semanticscholar.org
The design of router discovery (RD) is a trust mechanism to confirm the legitimacy of the host
and router. Fake router advertisement (RA) attacks have been made possible by this RD …

IPv6 security challenges

CE Caicedo, JBD Joshi, SR Tuladhar - Computer, 2009 - ieeexplore.ieee.org
IPv6 Security Challenges Page 1 IPv6, the new version of the Internet Protocol, has been
developed to provide new services and to support the Internet’s growth. An overview of the key …

[PDF][PDF] Don't forget to lock the back door! A characterization of IPv6 network security policy

J Czyz, M Luckie, M Allman… - Network and Distributed …, 2016 - ndss-symposium.org
There is growing operational awareness of the challenges in securely operating IPv6
networks. Through a measurement study of 520,000 dual-stack servers and 25,000 dual …

[PDF][PDF] Challenges and Mitigation Strategies for Transition from IPv4 Network to Virtualized Next-Generation IPv6 Network.

Z Ashraf, A Sohail, SA Latif, A Hameed… - Int. Arab J. Inf. Technol …, 2023 - ccis2k.org
The rapid proliferation of the Internet has exhausted Internet Protocol version 4 (IPv4)
addresses offered by Internet Assigned Number Authority (IANA). The new version of the IP …

[HTML][HTML] Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM …

Z Ashraf, A Sohail, M Iqbal - Cryptography, 2024 - mdpi.com
After the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture
quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will …

{IPv6} security: Attacks and countermeasures in a nutshell

J Ullrich, K Krombholz, H Hobel, A Dabrowski… - 8th USENIX Workshop …, 2014 - usenix.org
The history of computers is full of underestimation: 640 kilobyte, 2-digit years, and 32-bit
Internet addresses. IPv6 was invented to overcome the latter as well as to revise other …

[PDF][PDF] 面向可信网络研究的虚拟化技术

张怡, 孙志刚 - 计算机学报, 2009 - cjc.ict.ac.cn
摘要可信网络是互联网研究中的新方向. 文中通过对可信网络研究面临的挑战进行分析,
提出了虚拟化是开展可信网络研究的有效途径这一观点. 论文对网络虚拟化技术的研究现状进行 …

On srv6 security

DL Bascio, F Lombardi - Procedia Computer Science, 2022 - Elsevier
SRv6 is a routing architecture that can provide hybrid cooperation between a centralized
network controller and network nodes: IPv6 routers maintain the multi-hop ECMP-aware …

[PDF][PDF] Evasion of high-end IPS devices in the age of IPv6

A Atlasis, E Rey - BlackHat EU, 2014 - docs.huihoo.com
IPv6 era is here, either if you already use it or if you continue to ignore it. However, even in
the last case, this does not mean that your “nodes”(end-hosts, networking devices, security …