2021
DOI: 10.36244/icj.2021.4.2
|View full text |Cite
|
Sign up to set email alerts
|

Identification of the Possible Security Issues of the 464XLAT IPv6 Transition Technology

Abstract: This paper focuses on one of the most prominent IPv6 transition technologies named 464XLAT. The aim is to analyze the security threats that this technology might face. After carrying out the threat analysis using STRIDE method that stands for Spoofing, Tampering, Repudiation, Information Disclosure and Elevation of Privilege, and using DFD (Data-Flow Diagram) as a core for the analysis, we summarized the security vulnerabilities and attack points possibilities within this infrastructure. We have also built a t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 7 publications
0
0
0
Order By: Relevance
“…The first step in applying the STRIDE method is to build the DFD of the examined system and specify the potential attacking points at each element. Therefore, the DFD for DS-Lite was built as shown in Figure 5, which shows the spots (1)(2)(3)(4)(5)(6)(7)(8)(9)(10)(11). The security analysis is divided into several groups such as the traffic between the client and B4, then between B4 and the AFTR, etc.…”
Section: Applying Stride To Ds-litementioning
confidence: 99%
See 1 more Smart Citation
“…The first step in applying the STRIDE method is to build the DFD of the examined system and specify the potential attacking points at each element. Therefore, the DFD for DS-Lite was built as shown in Figure 5, which shows the spots (1)(2)(3)(4)(5)(6)(7)(8)(9)(10)(11). The security analysis is divided into several groups such as the traffic between the client and B4, then between B4 and the AFTR, etc.…”
Section: Applying Stride To Ds-litementioning
confidence: 99%
“…In [7], a testbed of 464XLAT was built using Debian-based virtual machines to evaluate the performance of the PLAT under a DoS (Denial of Service) attack, specifically testing the CPU performance and the pool of source port numbers. In a subsequent paper [8], the previous work was extended using a more powerful computer, allowing for an increase in the number of attacking clients (virtual machines) from 1 to 8. The PLAT performance was then tested after an attack using the hping3 command, ultimately demonstrating the susceptibility of the PLAT to DoS attacks.…”
Section: Introductionmentioning
confidence: 99%