An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali

Enterprises are required to utilize Internet Control Message Protocol version 6 (ICMPv6) when IPv6 is deployed. In IPv4, Internet Control Message Protocol (ICMP) is aggressively filtered by a network administrator while in IPv6, 1CMPv6 messages cannot be aggressively filtered due to the function of...

Full description

Saved in:
Bibliographic Details
Main Author: Wan Ali, Wan Nor Ashiqin
Format: Thesis
Language:English
Published: 2015
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/15285/1/TM_WAN%20NOR%20ASHIQIN%20WAN%20ALI%20CS%2015_5.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uitm-ir.15285
record_format uketd_dc
spelling my-uitm-ir.152852022-03-09T07:42:54Z An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali 2015 Wan Ali, Wan Nor Ashiqin Neural networks (Computer science) Web servers. Internet Enterprises are required to utilize Internet Control Message Protocol version 6 (ICMPv6) when IPv6 is deployed. In IPv4, Internet Control Message Protocol (ICMP) is aggressively filtered by a network administrator while in IPv6, 1CMPv6 messages cannot be aggressively filtered due to the function of ICMPv6 message. ICMPv6 security risks increase when ICMPv6 threats and vulnerabilities are exploited. Thus, it is very crucial for enterprises to address the issues. In practice, network researchers must review several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6 vulnerabilities. Overlooking any of these issues will jeopardize the security of ICMPv6. Currently, with the absence of ideal ICMPv6 threat model to identify and trace ICMPv6 threats, the possibility for a network to be attacked may increase. Therefore, this research aims to design and propose ICMPv6 threat model by applying the threat modeling steps. Then, attack scenario testing was conducted to validate the significance of the ICMPv6 threat model. While conducting the testing, !Pv6-Filtering Prototype System (I6-FPS) was developed to overcome the deficiency and limited filtering tools that supported IPv6. I6-FPS is used to automate and simplify the writing of IPv6 filtering rules (ip6tables) and it was developed using PHP5 and Shell script languages. Overall, this research revealed that ICMPv6 threat model and 16-FPS are significant in the initial phase of securing IPv6 deployment With the ICMPv6 threat model, enterprises are able to trace and tackle ICMPv6 threats and vulnerabilities in the IPv6 deployment. The ICMPv6 threat model has the potential to be extended by including more threats and vulnerabilities since the threat model is considered to be an iterative procedure that could be enhanced and developed over time 2015 Thesis https://ir.uitm.edu.my/id/eprint/15285/ https://ir.uitm.edu.my/id/eprint/15285/1/TM_WAN%20NOR%20ASHIQIN%20WAN%20ALI%20CS%2015_5.pdf text en public mphil masters Universiti Teknologi MARA Faculty Computer and Mathematical Sciences
institution Universiti Teknologi MARA
collection UiTM Institutional Repository
language English
topic Neural networks (Computer science)
Neural networks (Computer science)
spellingShingle Neural networks (Computer science)
Neural networks (Computer science)
Wan Ali, Wan Nor Ashiqin
An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali
description Enterprises are required to utilize Internet Control Message Protocol version 6 (ICMPv6) when IPv6 is deployed. In IPv4, Internet Control Message Protocol (ICMP) is aggressively filtered by a network administrator while in IPv6, 1CMPv6 messages cannot be aggressively filtered due to the function of ICMPv6 message. ICMPv6 security risks increase when ICMPv6 threats and vulnerabilities are exploited. Thus, it is very crucial for enterprises to address the issues. In practice, network researchers must review several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6 vulnerabilities. Overlooking any of these issues will jeopardize the security of ICMPv6. Currently, with the absence of ideal ICMPv6 threat model to identify and trace ICMPv6 threats, the possibility for a network to be attacked may increase. Therefore, this research aims to design and propose ICMPv6 threat model by applying the threat modeling steps. Then, attack scenario testing was conducted to validate the significance of the ICMPv6 threat model. While conducting the testing, !Pv6-Filtering Prototype System (I6-FPS) was developed to overcome the deficiency and limited filtering tools that supported IPv6. I6-FPS is used to automate and simplify the writing of IPv6 filtering rules (ip6tables) and it was developed using PHP5 and Shell script languages. Overall, this research revealed that ICMPv6 threat model and 16-FPS are significant in the initial phase of securing IPv6 deployment With the ICMPv6 threat model, enterprises are able to trace and tackle ICMPv6 threats and vulnerabilities in the IPv6 deployment. The ICMPv6 threat model has the potential to be extended by including more threats and vulnerabilities since the threat model is considered to be an iterative procedure that could be enhanced and developed over time
format Thesis
qualification_name Master of Philosophy (M.Phil.)
qualification_level Master's degree
author Wan Ali, Wan Nor Ashiqin
author_facet Wan Ali, Wan Nor Ashiqin
author_sort Wan Ali, Wan Nor Ashiqin
title An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali
title_short An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali
title_full An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali
title_fullStr An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali
title_full_unstemmed An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali
title_sort icmpv6 threat model / wan nor ashiqin wan ali
granting_institution Universiti Teknologi MARA
granting_department Faculty Computer and Mathematical Sciences
publishDate 2015
url https://ir.uitm.edu.my/id/eprint/15285/1/TM_WAN%20NOR%20ASHIQIN%20WAN%20ALI%20CS%2015_5.pdf
_version_ 1783733366311354368