2018
DOI: 10.1051/matecconf/201815006005
|View full text |Cite
|
Sign up to set email alerts
|

Application of Grounded Theory in Determining Required Elements for IPv6 Risk Assessment Equation

Abstract: The deployment of Internet Protocol version 6 (IPv6) has raised security concerns among the network administrators. Thus, in strengthening the network security, administrator requires an appropriate method to assess the possible risks that occur in their networks. Aware of the needs to calculate risk in IPv6 network, it is essential to an organization to have an equation that is flexible and consider the requirements of the network. However, the existing risk assessment equations do not consider the requiremen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…IPv6 implementation has sparked security challenges among network administrators. In order to improve network security, thereby, the administrator needs an effective approach for determining possible threats that can happen in networks [16], [17].…”
Section: Figure 1 Users Reaching Google Services Over Ipv6mentioning
confidence: 99%
“…IPv6 implementation has sparked security challenges among network administrators. In order to improve network security, thereby, the administrator needs an effective approach for determining possible threats that can happen in networks [16], [17].…”
Section: Figure 1 Users Reaching Google Services Over Ipv6mentioning
confidence: 99%
“…Mobility options and security support were among the concerns addressed during the IPv6 transition and the Internet Engineering Task Force worked hard to improve IPv6 over IPv4 [5]. On the other hand, the implementation of IPv6 has created security issues for networks, require to find efficient methods for identifying and being aware of the need to predict vulnerability in the IPv6 network, however, must use a robust algorithm to identify vulnerability and comprehend the network's specifications [6]. As shown in Fig.…”
Section: Introductionmentioning
confidence: 99%