An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali
Enterprises are required to utilize Internet Control Message Protocol version 6 (ICMPv6) when IPv6 is deployed. In IPv4, Internet Control Message Protocol (ICMP) is aggressively filtered by a network administrator while in IPv6, 1CMPv6 messages cannot be aggressively filtered due to the function of...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2015
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/15285/1/TM_WAN%20NOR%20ASHIQIN%20WAN%20ALI%20CS%2015_5.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-uitm-ir.15285 |
---|---|
record_format |
uketd_dc |
spelling |
my-uitm-ir.152852022-03-09T07:42:54Z An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali 2015 Wan Ali, Wan Nor Ashiqin Neural networks (Computer science) Web servers. Internet Enterprises are required to utilize Internet Control Message Protocol version 6 (ICMPv6) when IPv6 is deployed. In IPv4, Internet Control Message Protocol (ICMP) is aggressively filtered by a network administrator while in IPv6, 1CMPv6 messages cannot be aggressively filtered due to the function of ICMPv6 message. ICMPv6 security risks increase when ICMPv6 threats and vulnerabilities are exploited. Thus, it is very crucial for enterprises to address the issues. In practice, network researchers must review several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6 vulnerabilities. Overlooking any of these issues will jeopardize the security of ICMPv6. Currently, with the absence of ideal ICMPv6 threat model to identify and trace ICMPv6 threats, the possibility for a network to be attacked may increase. Therefore, this research aims to design and propose ICMPv6 threat model by applying the threat modeling steps. Then, attack scenario testing was conducted to validate the significance of the ICMPv6 threat model. While conducting the testing, !Pv6-Filtering Prototype System (I6-FPS) was developed to overcome the deficiency and limited filtering tools that supported IPv6. I6-FPS is used to automate and simplify the writing of IPv6 filtering rules (ip6tables) and it was developed using PHP5 and Shell script languages. Overall, this research revealed that ICMPv6 threat model and 16-FPS are significant in the initial phase of securing IPv6 deployment With the ICMPv6 threat model, enterprises are able to trace and tackle ICMPv6 threats and vulnerabilities in the IPv6 deployment. The ICMPv6 threat model has the potential to be extended by including more threats and vulnerabilities since the threat model is considered to be an iterative procedure that could be enhanced and developed over time 2015 Thesis https://ir.uitm.edu.my/id/eprint/15285/ https://ir.uitm.edu.my/id/eprint/15285/1/TM_WAN%20NOR%20ASHIQIN%20WAN%20ALI%20CS%2015_5.pdf text en public mphil masters Universiti Teknologi MARA Faculty Computer and Mathematical Sciences |
institution |
Universiti Teknologi MARA |
collection |
UiTM Institutional Repository |
language |
English |
topic |
Neural networks (Computer science) Neural networks (Computer science) |
spellingShingle |
Neural networks (Computer science) Neural networks (Computer science) Wan Ali, Wan Nor Ashiqin An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali |
description |
Enterprises are required to utilize Internet Control Message Protocol version 6 (ICMPv6) when IPv6 is deployed. In IPv4, Internet Control Message Protocol (ICMP) is aggressively filtered by a network administrator while in IPv6, 1CMPv6 messages cannot be aggressively filtered due to the function of ICMPv6 message. ICMPv6 security risks increase when ICMPv6 threats and vulnerabilities are exploited. Thus, it is very crucial for enterprises to address the issues. In practice, network researchers must review several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6 vulnerabilities. Overlooking any of these issues will jeopardize the security of ICMPv6. Currently, with the absence of ideal ICMPv6 threat model to identify and trace ICMPv6 threats, the possibility for a network to be attacked may increase. Therefore, this research aims to design and propose ICMPv6 threat model by applying the threat modeling steps. Then, attack scenario testing was conducted to validate the significance of the ICMPv6 threat model. While conducting the testing, !Pv6-Filtering Prototype System (I6-FPS) was developed to overcome the deficiency and limited filtering tools that supported IPv6. I6-FPS is used to automate and simplify the writing of IPv6 filtering rules (ip6tables) and it was developed using PHP5 and Shell script languages. Overall, this research revealed that ICMPv6 threat model and 16-FPS are significant in the initial phase of securing IPv6 deployment With the ICMPv6 threat model, enterprises are able to trace and tackle ICMPv6 threats and vulnerabilities in the IPv6 deployment. The ICMPv6 threat model has the potential to be extended by including more threats and vulnerabilities since the threat model is considered to be an iterative procedure that could be enhanced and developed over time |
format |
Thesis |
qualification_name |
Master of Philosophy (M.Phil.) |
qualification_level |
Master's degree |
author |
Wan Ali, Wan Nor Ashiqin |
author_facet |
Wan Ali, Wan Nor Ashiqin |
author_sort |
Wan Ali, Wan Nor Ashiqin |
title |
An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali |
title_short |
An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali |
title_full |
An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali |
title_fullStr |
An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali |
title_full_unstemmed |
An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali |
title_sort |
icmpv6 threat model / wan nor ashiqin wan ali |
granting_institution |
Universiti Teknologi MARA |
granting_department |
Faculty Computer and Mathematical Sciences |
publishDate |
2015 |
url |
https://ir.uitm.edu.my/id/eprint/15285/1/TM_WAN%20NOR%20ASHIQIN%20WAN%20ALI%20CS%2015_5.pdf |
_version_ |
1783733366311354368 |