Your SlideShare is downloading. ×
Leveraging IPv6 Features to Ensure Security
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Leveraging IPv6 Features to Ensure Security

177
views

Published on

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
177
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. IPv6 – the future of data protection. Alexander Nevalennii CISO of “ATAK “ Student of National Research Nuclear University “ME Phi”
  • 2. The root of fraud technologies – anonymity!!!
  • 3. Problems of the malefactor’s identification.  Reduced ipv4 addresses pool.  Usage of anonymous networks of proxies which are located in different countries.  Difficult way of finding a malefactor by ip – address.  No international agreements about looking out malefactors in the world.  No international standards about ipv4 pool allocation in the world.
  • 4. How to solve problems by using IPv6.  Use the IPv6 addresses pool (>>IPv4).  Make standards (ITU) about allocation IPv6 pool (as for telephone addresses pool). Use prefix IPv6 for identification of a country, a city. Providers can sell IPv6 addresses all companies and people.  Make agreements about looking out malefactors.  Define one common police (for example: Interpol)  Use routers between virtual networks of different countries for closing malefactor’s traffic.  Don’t use NAT!!!!
  • 5. Results.  Without NAT malefactors will not be able to be anonymous.  According to international standards and arrangements, malefactors can be identified. Prefix will show a country and a city. Provider’s contracts with clients will show information about a company or a person.  Internet will have real borders.
  • 6. Some troubles after.  Botnets.  Usage of public Wi-Fi connection.  Anonymous nets (L2P) and onion sites.

×