DocumentCode :
2589752
Title :
IPv6: Nowhere to Run, Nowhere to Hide
Author :
Groat, Stephen ; Dunlop, Matthew ; Marchany, Randy ; Tront, Joseph
Author_Institution :
Bradley Dept. of Electr. & Comput. Eng., Virginia Polytech. Inst. & State Univ., Blacksburg, VA, USA
fYear :
2011
fDate :
4-7 Jan. 2011
Firstpage :
1
Lastpage :
10
Abstract :
Due to a large address space, Internet Protocol version 6 (IPv6) uses stateless address autoconfiguration to assign network addresses to hosts. This unmanaged technique creates a static value derived from the Media Access Control (MAC) address of a network interface as the host portion, or interface identifier (IID). Static IID assignment provides third parties (whether malicious or not) with the ability to track a node´s physical location, correlate network traffic with a specific user, and collect details about a node´s operating system. Using our live production IPv6 network, we demonstrate not only the feasibility of IID monitoring, but also the ease with which an attacker can accomplish it. We then highlight some possible nefarious applications where IPv6 address tracking and analysis could assist the cyber criminal. In order to prevent this privacy breach, we offer solutions that disassociate the IPv6 address from its user.
Keywords :
IP networks; access protocols; IPv6 address tracking; Internet Protocol version 6; autoconfiguration; cyber criminal; interface identifier; live production IPv6 network; media access control address; network address; network interface; network traffic; operating system; physical location; privacy breach; static IID assignment; Internet; Mobile communication; Privacy; Protocols; Security; Tracking; Wireless communication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
System Sciences (HICSS), 2011 44th Hawaii International Conference on
Conference_Location :
Kauai, HI
ISSN :
1530-1605
Print_ISBN :
978-1-4244-9618-1
Type :
conf
DOI :
10.1109/HICSS.2011.258
Filename :
5718514
Link To Document :
بازگشت