IPv6 – the future of data protection.
Alexander Nevalennii
CISO of “ATAK “
Student of National Research
Nuclear University...
The root of fraud technologies –
anonymity!!!
Problems of the malefactor’s
identification.
 Reduced ipv4 addresses pool.
 Usage of anonymous networks of proxies which...
How to solve problems by using
IPv6.
 Use the IPv6 addresses pool (>>IPv4).
 Make standards (ITU) about allocation IPv6 ...
Results.
 Without NAT malefactors will not be able to be
anonymous.
 According to international standards and
arrangemen...
Some troubles after.
 Botnets.
 Usage of public Wi-Fi connection.
 Anonymous nets (L2P) and onion sites.
Upcoming SlideShare
Loading in …5
×

Leveraging IPv6 Features to Ensure Security

874 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
874
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
17
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Leveraging IPv6 Features to Ensure Security

  1. 1. IPv6 – the future of data protection. Alexander Nevalennii CISO of “ATAK “ Student of National Research Nuclear University “ME Phi”
  2. 2. The root of fraud technologies – anonymity!!!
  3. 3. Problems of the malefactor’s identification.  Reduced ipv4 addresses pool.  Usage of anonymous networks of proxies which are located in different countries.  Difficult way of finding a malefactor by ip – address.  No international agreements about looking out malefactors in the world.  No international standards about ipv4 pool allocation in the world.
  4. 4. How to solve problems by using IPv6.  Use the IPv6 addresses pool (>>IPv4).  Make standards (ITU) about allocation IPv6 pool (as for telephone addresses pool). Use prefix IPv6 for identification of a country, a city. Providers can sell IPv6 addresses all companies and people.  Make agreements about looking out malefactors.  Define one common police (for example: Interpol)  Use routers between virtual networks of different countries for closing malefactor’s traffic.  Don’t use NAT!!!!
  5. 5. Results.  Without NAT malefactors will not be able to be anonymous.  According to international standards and arrangements, malefactors can be identified. Prefix will show a country and a city. Provider’s contracts with clients will show information about a company or a person.  Internet will have real borders.
  6. 6. Some troubles after.  Botnets.  Usage of public Wi-Fi connection.  Anonymous nets (L2P) and onion sites.

×