Downloads: 122 | Views: 295
Research Paper | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017 | Popularity: 6.9 / 10
Study and Comparison of Network Security in IPv4 and IPv6
Gagandeep Kaur, Dr. Karanjit Singh Kahlon
Abstract: Internet Protocol version 6 (IPv6) is the next generation internet protocol which is still in its transition phase from IPv4. The present paper not only discusses about the necessity of IPv6 which resulted from the exhaustion of IPv4 addresses but also present the study and comparison of various security issues in IPv4 and IPv6. It is clearly understood that today the IPv4 public addresses have been exhausted and there is clear need for transition to IPv6 which is necessary to remain connected with Internet. On the other hand, the migration process to IPv6 has strong impact on the network security. Although, IPv6 provides various innovative features which help to provide network security but because of infancy stage, it is also considered as a dangerous weapon that the attacker can use. In IPv4, various threats like viruses, worms, botnets and attacks like DoS, Fishing and Spoofing are independent of the Internet Protocol version used. In order to minimize the threats, more security measures are required. Firewall policies, network security rules must be hardened. As the IPv6 is new, the applications designed for IPv6 as well as the software are not yet field proven. They may contain bugs or errors that can become vulnerable to the network security. Also the quick transition from IPv4 to IPv6 is not possible and may span in years. With time and support, IPv6 when implemented will provide security on the equal level as todays IPv4 and even higher.
Keywords: IPv4, IPv6, Network Security
Edition: Volume 6 Issue 4, April 2017
Pages: 2434 - 2436
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 1497 - 1500Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels
Arnab Dey
Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 779 - 789Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure
Surbhi Batra, Chandra Sekhar Dash
Downloads: 5 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5
Analysis Study Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 13 Issue 3, March 2024
Pages: 1927 - 1929Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix
Tahir Bashir
Downloads: 8 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024
Pages: 882 - 886Maximizing Cyber Security through Machine Learning and Data Analysis for Advanced Threat Detection and Mitigation
Manupreet Kaur
Downloads: 99
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 530 - 533QoS Provisioning Using Latency for IPV6
T. Vengatesh, Dr. S. Thabasu Kannan