IPv6 Security and Forensics

Vincent Nicolls; Nhien-An Le-Khac; Lei Chen; Mark Scanlon

Publication Date:  August 2016

Publication Name:  2nd International Workshop on Cloud Security and Forensics (WCSF 2016)

Abstract:   IPv4 is the historical addressing protocol used for all devices connected worldwide. It has survived for over 30 years and has been an integral part of the Internet revolution. However, due to its limitation, IPv4 is being replacing by IPv6. Today, IPv6 is more and more widely used on the Internet. On the other hand, criminals are also well aware of the introduction of IPv6. They are continuously seeking new methods to make profit, hiding their activities, infiltrate or exfiltrate important data from companies. The introduction of this new protocol may provide savvy cybercriminals more opportunities to discover new system vulnerabilities and exploit them. To date, there is little research on IPv6 security and forensics in the literature. In this paper, we look at different types of IPv6 attacks and we present a new approach.

Download Paper:

Download Paper as PDF

BibTeX Entry:


      @article{nicolls2016ipv6,
author="Vincent Nicolls and Nhien-An Le-Khac and Lei Chen and Mark Scanlon",
title="{IPv6 Security and Forensics}",
booktitle="{2nd International Workshop on Cloud Security and Forensics (WCSF 2016)}",
year="2016",
month="08",
address={Dublin, Ireland},
publisher={IEEE},
pages=743-748,
abstract="IPv4 is the historical addressing protocol used for all devices connected worldwide. It has survived for over 30 years and has been an integral part of the Internet revolution. However, due to its limitation, IPv4 is being replacing by IPv6. Today, IPv6 is more and more widely used on the Internet. On the other hand, criminals are also well aware of the introduction of IPv6. They are continuously seeking new methods to make profit, hiding their activities, infiltrate or exfiltrate important data from companies. The introduction of this new protocol may provide savvy cybercriminals more opportunities to discover new system vulnerabilities and exploit them. To date, there is little research on IPv6 security and forensics in the literature. In this paper, we look at different types of IPv6 attacks and we present a new approach."
}