Unreachable Message

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 6 Experts worldwide ranked by ideXlab platform

Jianping Wu - One of the best experts on this subject based on the ideXlab platform.

  • H6Proxy: ICMPv6 weakness analysis and implementation of IPv6 attacking test proxy
    UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences, 2009
    Co-Authors: Wu Liu, Hai-xin Duan, Tao Lin, Li Xing, Jianping Wu
    Abstract:

    Although IPv6 protocol has considered and implemented more security mechanisms compared with IPv4, there are still many security threatens in IPv6 networks. Being one of the key protocols in IPv6, the Internet control Message protocol (ICMPv6) suffers from severe security risks. In this paper we construct an IPv6 attacking test system H6Proxy exploiting the ICMPv6 Unreachable Message, which shows that the security of IPv6 protocol is still very weak.

Wu Liu - One of the best experts on this subject based on the ideXlab platform.

  • H6Proxy: ICMPv6 weakness analysis and implementation of IPv6 attacking test proxy
    UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences, 2009
    Co-Authors: Wu Liu, Hai-xin Duan, Tao Lin, Li Xing, Jianping Wu
    Abstract:

    Although IPv6 protocol has considered and implemented more security mechanisms compared with IPv4, there are still many security threatens in IPv6 networks. Being one of the key protocols in IPv6, the Internet control Message protocol (ICMPv6) suffers from severe security risks. In this paper we construct an IPv6 attacking test system H6Proxy exploiting the ICMPv6 Unreachable Message, which shows that the security of IPv6 protocol is still very weak.

Hai-xin Duan - One of the best experts on this subject based on the ideXlab platform.

  • H6Proxy: ICMPv6 weakness analysis and implementation of IPv6 attacking test proxy
    UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences, 2009
    Co-Authors: Wu Liu, Hai-xin Duan, Tao Lin, Li Xing, Jianping Wu
    Abstract:

    Although IPv6 protocol has considered and implemented more security mechanisms compared with IPv4, there are still many security threatens in IPv6 networks. Being one of the key protocols in IPv6, the Internet control Message protocol (ICMPv6) suffers from severe security risks. In this paper we construct an IPv6 attacking test system H6Proxy exploiting the ICMPv6 Unreachable Message, which shows that the security of IPv6 protocol is still very weak.

Tao Lin - One of the best experts on this subject based on the ideXlab platform.

  • H6Proxy: ICMPv6 weakness analysis and implementation of IPv6 attacking test proxy
    UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences, 2009
    Co-Authors: Wu Liu, Hai-xin Duan, Tao Lin, Li Xing, Jianping Wu
    Abstract:

    Although IPv6 protocol has considered and implemented more security mechanisms compared with IPv4, there are still many security threatens in IPv6 networks. Being one of the key protocols in IPv6, the Internet control Message protocol (ICMPv6) suffers from severe security risks. In this paper we construct an IPv6 attacking test system H6Proxy exploiting the ICMPv6 Unreachable Message, which shows that the security of IPv6 protocol is still very weak.

Li Xing - One of the best experts on this subject based on the ideXlab platform.

  • H6Proxy: ICMPv6 weakness analysis and implementation of IPv6 attacking test proxy
    UIC-ATC 2009 - Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences, 2009
    Co-Authors: Wu Liu, Hai-xin Duan, Tao Lin, Li Xing, Jianping Wu
    Abstract:

    Although IPv6 protocol has considered and implemented more security mechanisms compared with IPv4, there are still many security threatens in IPv6 networks. Being one of the key protocols in IPv6, the Internet control Message protocol (ICMPv6) suffers from severe security risks. In this paper we construct an IPv6 attacking test system H6Proxy exploiting the ICMPv6 Unreachable Message, which shows that the security of IPv6 protocol is still very weak.