检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]北京邮电大学计算机科学与技术学院,北京100876 [2]北京邮电大学信息网络中心,北京100876
出 处:《计算机应用研究》2006年第11期109-112,共4页Application Research of Computers
基 金:国家网络与信息安全保障持续发展计划资助项目(2004-研1-917-C-022)
摘 要:IPv6作为可控、可信、可扩展的下一代网络核心协议已经从试验阶段走向实际应用。普遍认为IPv6因有IPSec而比IPv4更安全,但IPv6网络在实际部署中往往没有实施IPSec。IPv6协议在没有IPSec时的安全性,特别是过渡时期和IPv6协议自身的安全性问题值得深入研究。主要研究了IPv6在没有IPSec时的安全性。首先对IPv6网络中的攻击和安全问题进行了分类和概述,然后分两部分重点讨论了过渡时期的安全性和IPv6特有的安全性,并给出了一些攻击和漏洞的防护建议。IPv6, the key protocol of the controllable, trustable and scalable next generation network, has evolved from experimental phrase to real-live application phase. Because IPv6 mandates the inclusion of IPSec, it is taken for granted that IPv6 is more secure than IPv4. In the reality, however, IPv6 is usually deployed without cryptographic protections of any kind. The security of IPv6 without IPSec, especially the security in the transition phase and the native security of IPv6, is worth studying. This paper mainly studied the vulnerability of IPv6 without IPSec. Firstly, the attacks and vulnerabilities in IPv6 network were classified and described in general. Then, the vulnerability in the transition stage and the native vulnerability of IPv6 were discussed in detail as a separated part respectively. Some suggestions for defending against the threats or reinforcing the system were given.
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.185