DocumentCode :
3749172
Title :
Cyber security attacks on network with transition mechanisms
Author :
Shaneel Narayan;Ruchinav Gupta;Avinesh Kumar;Salman Ishrar;Ziafil Khan
Author_Institution :
Unitec Institute of Technology, Auckland, New Zealand
fYear :
2015
Firstpage :
163
Lastpage :
169
Abstract :
Cyber security is a big part of the Internet nowadays. There are cyber-attacks happening around the world right this very moment. Attacker mainly target national or corporate organizations and use cyber-attacks to attack and penetrate their network, which include the server, routers and computers. Transition mechanisms such as NAT64, 6to4, 4to6, 4in6, 6rd, Dual Stack and ISATAP were developed by Internet Engineering Task Force (IETF) to establish communication between IPv4 and IPv6 standards. There has not been much research done in the past to show how secure these transition mechanism are. This paper shows the performance and comparison between 4to6 transition mechanism and 6to4 transition mechanism when attacked by various cyber-attacks such as the Nmap, Zenmap, Smurf6 and flood router6. This paper also compares how both the transition mechanisms perform when Virtual Private Network (VPN) such as PPTP and IPsec are configured and the different cyber-attacks are executed. The average values of UDP and TCP delay and jitter for each of the tests that was performed are shown in the graphs.
Keywords :
"Computers","Virtual private networks","Protocols","Internet","Standards","Computer crime"
Publisher :
ieee
Conference_Titel :
Computing and Network Communications (CoCoNet), 2015 International Conference on
Type :
conf
DOI :
10.1109/CoCoNet.2015.7411182
Filename :
7411182
Link To Document :
بازگشت