SlideShare a Scribd company logo
1 of 1
Download to read offline
Security issues of Neighbor Discovery in IPv6:
IPv6 nodes use the Neighbor Discovery Protocol to discover other nodes on the link, to establish
the link-layer addresses to find routers, and to maintain reachability information about the paths
to active neighbors. It turns out that the basic NDP lacks a method for determining approved
neighbors. If not secured, NDP is vulnerable to various attacks like redirection, stealing
addresses, rejection of service advertisement, and parameter spoofing could occur.
IPv6 Neighbor Discovery issues:
The functionality of the IPv6 Neighbor Discovery protocol corresponds to the combination of the
IPv4 protocols. IPv6 has some new vulnerabilities because of the structure of its headers. The
security of IPv4 is roughly equivalent to IPv6. So, the same issues occur in IPv4 equivalent
protocols.
Solution
Security issues of Neighbor Discovery in IPv6:
IPv6 nodes use the Neighbor Discovery Protocol to discover other nodes on the link, to establish
the link-layer addresses to find routers, and to maintain reachability information about the paths
to active neighbors. It turns out that the basic NDP lacks a method for determining approved
neighbors. If not secured, NDP is vulnerable to various attacks like redirection, stealing
addresses, rejection of service advertisement, and parameter spoofing could occur.
IPv6 Neighbor Discovery issues:
The functionality of the IPv6 Neighbor Discovery protocol corresponds to the combination of the
IPv4 protocols. IPv6 has some new vulnerabilities because of the structure of its headers. The
security of IPv4 is roughly equivalent to IPv6. So, the same issues occur in IPv4 equivalent
protocols.

More Related Content

Similar to Security issues of Neighbor Discovery in IPv6IPv6 nodes use the N.pdf

APNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisonsAPNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisonsAPNIC
 
Can NAT 64 Solve IPv4 Exhaustion | IPv4 Addresses | Address Space
Can NAT 64 Solve IPv4 Exhaustion | IPv4 Addresses | Address SpaceCan NAT 64 Solve IPv4 Exhaustion | IPv4 Addresses | Address Space
Can NAT 64 Solve IPv4 Exhaustion | IPv4 Addresses | Address SpaceIPv4Mall
 
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn FortinetDigicomp Academy AG
 
IPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live DemoIPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live DemoDigicomp Academy AG
 
7 2.5 3 Lab - Identifying IPv6 Addresses.pdf
7 2.5 3 Lab - Identifying IPv6 Addresses.pdf7 2.5 3 Lab - Identifying IPv6 Addresses.pdf
7 2.5 3 Lab - Identifying IPv6 Addresses.pdfSamantha Vargas
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issuesbathinin1
 
Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 Security
Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 SecurityFernando Gont - The Hack Summit 2021 - State of the Art in IPv6 Security
Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 SecurityEdgeUno
 
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaWardner Maia
 
IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)Juniper Networks
 
Ipv6 neighbor discovery problems and mitigations
Ipv6 neighbor discovery problems and mitigationsIpv6 neighbor discovery problems and mitigations
Ipv6 neighbor discovery problems and mitigationsKarunakant Rai
 
2009 11 06 3gpp Ietf Ipv6 Shanghai Nat64
2009 11 06 3gpp Ietf Ipv6 Shanghai Nat642009 11 06 3gpp Ietf Ipv6 Shanghai Nat64
2009 11 06 3gpp Ietf Ipv6 Shanghai Nat64yacc2000
 
Preparing an IPv6 Addressing Planl
Preparing an IPv6 Addressing PlanlPreparing an IPv6 Addressing Planl
Preparing an IPv6 Addressing PlanlDave Thyssen
 
Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Erik Ginalick
 
Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Erik Ginalick
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Mumbai Academisc
 

Similar to Security issues of Neighbor Discovery in IPv6IPv6 nodes use the N.pdf (20)

APNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisonsAPNIC Hackathon IPv4 & IPv6 security & threat comparisons
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
 
I Pv6 Enabling Menog 0.4
I Pv6 Enabling Menog 0.4I Pv6 Enabling Menog 0.4
I Pv6 Enabling Menog 0.4
 
Can NAT 64 Solve IPv4 Exhaustion | IPv4 Addresses | Address Space
Can NAT 64 Solve IPv4 Exhaustion | IPv4 Addresses | Address SpaceCan NAT 64 Solve IPv4 Exhaustion | IPv4 Addresses | Address Space
Can NAT 64 Solve IPv4 Exhaustion | IPv4 Addresses | Address Space
 
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
4. IPv6 Security - Workshop mit Live Demo - Marco Senn Fortinet
 
IPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live DemoIPv6 Security - Workshop mit Live Demo
IPv6 Security - Workshop mit Live Demo
 
7 2.5 3 Lab - Identifying IPv6 Addresses.pdf
7 2.5 3 Lab - Identifying IPv6 Addresses.pdf7 2.5 3 Lab - Identifying IPv6 Addresses.pdf
7 2.5 3 Lab - Identifying IPv6 Addresses.pdf
 
Survey on IPv6 security issues
Survey on IPv6 security issuesSurvey on IPv6 security issues
Survey on IPv6 security issues
 
Neo4jrb
Neo4jrbNeo4jrb
Neo4jrb
 
Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 Security
Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 SecurityFernando Gont - The Hack Summit 2021 - State of the Art in IPv6 Security
Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 Security
 
Hacking 05 2011
Hacking 05 2011Hacking 05 2011
Hacking 05 2011
 
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
 
Neutron IPv6
Neutron IPv6Neutron IPv6
Neutron IPv6
 
IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)
 
Ipv6 neighbor discovery problems and mitigations
Ipv6 neighbor discovery problems and mitigationsIpv6 neighbor discovery problems and mitigations
Ipv6 neighbor discovery problems and mitigations
 
Tech f42
Tech f42Tech f42
Tech f42
 
2009 11 06 3gpp Ietf Ipv6 Shanghai Nat64
2009 11 06 3gpp Ietf Ipv6 Shanghai Nat642009 11 06 3gpp Ietf Ipv6 Shanghai Nat64
2009 11 06 3gpp Ietf Ipv6 Shanghai Nat64
 
Preparing an IPv6 Addressing Planl
Preparing an IPv6 Addressing PlanlPreparing an IPv6 Addressing Planl
Preparing an IPv6 Addressing Planl
 
Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504Ipv6 Technical White Paper Wp111504
Ipv6 Technical White Paper Wp111504
 
Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504Ipv Technical White Paper Wp111504
Ipv Technical White Paper Wp111504
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)
 

More from anukoolelectronics

When two atoms are covalently bonded, the more el.pdf
                     When two atoms are covalently bonded, the more el.pdf                     When two atoms are covalently bonded, the more el.pdf
When two atoms are covalently bonded, the more el.pdfanukoolelectronics
 
we can senthysise 4 methylheptanal to propene by .pdf
                     we can senthysise 4 methylheptanal to propene by .pdf                     we can senthysise 4 methylheptanal to propene by .pdf
we can senthysise 4 methylheptanal to propene by .pdfanukoolelectronics
 
The enthalpy change is negative because a bond is.pdf
                     The enthalpy change is negative because a bond is.pdf                     The enthalpy change is negative because a bond is.pdf
The enthalpy change is negative because a bond is.pdfanukoolelectronics
 
moles F- = 0.100 M x 0.0250 L=0.00250 moles H+ ad.pdf
                     moles F- = 0.100 M x 0.0250 L=0.00250 moles H+ ad.pdf                     moles F- = 0.100 M x 0.0250 L=0.00250 moles H+ ad.pdf
moles F- = 0.100 M x 0.0250 L=0.00250 moles H+ ad.pdfanukoolelectronics
 
In Chemistry, a mixture is defined as two or more.pdf
                     In Chemistry, a mixture is defined as two or more.pdf                     In Chemistry, a mixture is defined as two or more.pdf
In Chemistry, a mixture is defined as two or more.pdfanukoolelectronics
 
Suppose distribution an IP datagram since A to F. Suppose over the e.pdf
Suppose distribution an IP datagram since A to F. Suppose over the e.pdfSuppose distribution an IP datagram since A to F. Suppose over the e.pdf
Suppose distribution an IP datagram since A to F. Suppose over the e.pdfanukoolelectronics
 
The picture is identified as the negative coccus.Gram-negative bac.pdf
The picture is identified as the negative coccus.Gram-negative bac.pdfThe picture is identified as the negative coccus.Gram-negative bac.pdf
The picture is identified as the negative coccus.Gram-negative bac.pdfanukoolelectronics
 
The disclosure requirements for the assignment of specific receivabl.pdf
The disclosure requirements for the assignment of specific receivabl.pdfThe disclosure requirements for the assignment of specific receivabl.pdf
The disclosure requirements for the assignment of specific receivabl.pdfanukoolelectronics
 
The answer is composite key.If the primarykey is combination of on.pdf
The answer is composite key.If the primarykey is combination of on.pdfThe answer is composite key.If the primarykey is combination of on.pdf
The answer is composite key.If the primarykey is combination of on.pdfanukoolelectronics
 
Temparatre.javaimport java.util.Scanner; public class Temparat.pdf
Temparatre.javaimport java.util.Scanner; public class Temparat.pdfTemparatre.javaimport java.util.Scanner; public class Temparat.pdf
Temparatre.javaimport java.util.Scanner; public class Temparat.pdfanukoolelectronics
 
Since They are not Divisible by any other number and are divisible 1.pdf
Since They are not Divisible by any other number and are divisible 1.pdfSince They are not Divisible by any other number and are divisible 1.pdf
Since They are not Divisible by any other number and are divisible 1.pdfanukoolelectronics
 
Just looking at a t table SolutionJust looking at a t tab.pdf
Just looking at a t table SolutionJust looking at a t tab.pdfJust looking at a t table SolutionJust looking at a t tab.pdf
Just looking at a t table SolutionJust looking at a t tab.pdfanukoolelectronics
 
Because there is the largest number of electrons .pdf
                     Because there is the largest number of electrons .pdf                     Because there is the largest number of electrons .pdf
Because there is the largest number of electrons .pdfanukoolelectronics
 
HPLC, is a chromatographic technique used to separate a mixture of c.pdf
HPLC, is a chromatographic technique used to separate a mixture of c.pdfHPLC, is a chromatographic technique used to separate a mixture of c.pdf
HPLC, is a chromatographic technique used to separate a mixture of c.pdfanukoolelectronics
 
F2 F is the most electronegative. Thus, among these diatomic speci.pdf
F2 F is the most electronegative. Thus, among these diatomic speci.pdfF2 F is the most electronegative. Thus, among these diatomic speci.pdf
F2 F is the most electronegative. Thus, among these diatomic speci.pdfanukoolelectronics
 
evo-devo stands for Evolutionary developmental biology (It compares .pdf
evo-devo stands for Evolutionary developmental biology (It compares .pdfevo-devo stands for Evolutionary developmental biology (It compares .pdf
evo-devo stands for Evolutionary developmental biology (It compares .pdfanukoolelectronics
 
e) none of the aboveSolutione) none of the above.pdf
e) none of the aboveSolutione) none of the above.pdfe) none of the aboveSolutione) none of the above.pdf
e) none of the aboveSolutione) none of the above.pdfanukoolelectronics
 
An s orbital is spherical in shape.Its electron d.pdf
                     An s orbital is spherical in shape.Its electron d.pdf                     An s orbital is spherical in shape.Its electron d.pdf
An s orbital is spherical in shape.Its electron d.pdfanukoolelectronics
 
B. Cryptanalysis is the act of obtaining plain text from cipher text.pdf
B. Cryptanalysis is the act of obtaining plain text from cipher text.pdfB. Cryptanalysis is the act of obtaining plain text from cipher text.pdf
B. Cryptanalysis is the act of obtaining plain text from cipher text.pdfanukoolelectronics
 

More from anukoolelectronics (20)

When two atoms are covalently bonded, the more el.pdf
                     When two atoms are covalently bonded, the more el.pdf                     When two atoms are covalently bonded, the more el.pdf
When two atoms are covalently bonded, the more el.pdf
 
we can senthysise 4 methylheptanal to propene by .pdf
                     we can senthysise 4 methylheptanal to propene by .pdf                     we can senthysise 4 methylheptanal to propene by .pdf
we can senthysise 4 methylheptanal to propene by .pdf
 
The enthalpy change is negative because a bond is.pdf
                     The enthalpy change is negative because a bond is.pdf                     The enthalpy change is negative because a bond is.pdf
The enthalpy change is negative because a bond is.pdf
 
moles F- = 0.100 M x 0.0250 L=0.00250 moles H+ ad.pdf
                     moles F- = 0.100 M x 0.0250 L=0.00250 moles H+ ad.pdf                     moles F- = 0.100 M x 0.0250 L=0.00250 moles H+ ad.pdf
moles F- = 0.100 M x 0.0250 L=0.00250 moles H+ ad.pdf
 
In Chemistry, a mixture is defined as two or more.pdf
                     In Chemistry, a mixture is defined as two or more.pdf                     In Chemistry, a mixture is defined as two or more.pdf
In Chemistry, a mixture is defined as two or more.pdf
 
Suppose distribution an IP datagram since A to F. Suppose over the e.pdf
Suppose distribution an IP datagram since A to F. Suppose over the e.pdfSuppose distribution an IP datagram since A to F. Suppose over the e.pdf
Suppose distribution an IP datagram since A to F. Suppose over the e.pdf
 
YesSolutionYes.pdf
YesSolutionYes.pdfYesSolutionYes.pdf
YesSolutionYes.pdf
 
The picture is identified as the negative coccus.Gram-negative bac.pdf
The picture is identified as the negative coccus.Gram-negative bac.pdfThe picture is identified as the negative coccus.Gram-negative bac.pdf
The picture is identified as the negative coccus.Gram-negative bac.pdf
 
The disclosure requirements for the assignment of specific receivabl.pdf
The disclosure requirements for the assignment of specific receivabl.pdfThe disclosure requirements for the assignment of specific receivabl.pdf
The disclosure requirements for the assignment of specific receivabl.pdf
 
The answer is composite key.If the primarykey is combination of on.pdf
The answer is composite key.If the primarykey is combination of on.pdfThe answer is composite key.If the primarykey is combination of on.pdf
The answer is composite key.If the primarykey is combination of on.pdf
 
Temparatre.javaimport java.util.Scanner; public class Temparat.pdf
Temparatre.javaimport java.util.Scanner; public class Temparat.pdfTemparatre.javaimport java.util.Scanner; public class Temparat.pdf
Temparatre.javaimport java.util.Scanner; public class Temparat.pdf
 
Since They are not Divisible by any other number and are divisible 1.pdf
Since They are not Divisible by any other number and are divisible 1.pdfSince They are not Divisible by any other number and are divisible 1.pdf
Since They are not Divisible by any other number and are divisible 1.pdf
 
Just looking at a t table SolutionJust looking at a t tab.pdf
Just looking at a t table SolutionJust looking at a t tab.pdfJust looking at a t table SolutionJust looking at a t tab.pdf
Just looking at a t table SolutionJust looking at a t tab.pdf
 
Because there is the largest number of electrons .pdf
                     Because there is the largest number of electrons .pdf                     Because there is the largest number of electrons .pdf
Because there is the largest number of electrons .pdf
 
HPLC, is a chromatographic technique used to separate a mixture of c.pdf
HPLC, is a chromatographic technique used to separate a mixture of c.pdfHPLC, is a chromatographic technique used to separate a mixture of c.pdf
HPLC, is a chromatographic technique used to separate a mixture of c.pdf
 
F2 F is the most electronegative. Thus, among these diatomic speci.pdf
F2 F is the most electronegative. Thus, among these diatomic speci.pdfF2 F is the most electronegative. Thus, among these diatomic speci.pdf
F2 F is the most electronegative. Thus, among these diatomic speci.pdf
 
evo-devo stands for Evolutionary developmental biology (It compares .pdf
evo-devo stands for Evolutionary developmental biology (It compares .pdfevo-devo stands for Evolutionary developmental biology (It compares .pdf
evo-devo stands for Evolutionary developmental biology (It compares .pdf
 
e) none of the aboveSolutione) none of the above.pdf
e) none of the aboveSolutione) none of the above.pdfe) none of the aboveSolutione) none of the above.pdf
e) none of the aboveSolutione) none of the above.pdf
 
An s orbital is spherical in shape.Its electron d.pdf
                     An s orbital is spherical in shape.Its electron d.pdf                     An s orbital is spherical in shape.Its electron d.pdf
An s orbital is spherical in shape.Its electron d.pdf
 
B. Cryptanalysis is the act of obtaining plain text from cipher text.pdf
B. Cryptanalysis is the act of obtaining plain text from cipher text.pdfB. Cryptanalysis is the act of obtaining plain text from cipher text.pdf
B. Cryptanalysis is the act of obtaining plain text from cipher text.pdf
 

Recently uploaded

DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...Gary Wood
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...Nguyen Thanh Tu Collection
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportDenish Jangid
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppCeline George
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MysoreMuleSoftMeetup
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi RajagopalEADTU
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptxVishal Singh
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...EduSkills OECD
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 

Recently uploaded (20)

DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 

Security issues of Neighbor Discovery in IPv6IPv6 nodes use the N.pdf

  • 1. Security issues of Neighbor Discovery in IPv6: IPv6 nodes use the Neighbor Discovery Protocol to discover other nodes on the link, to establish the link-layer addresses to find routers, and to maintain reachability information about the paths to active neighbors. It turns out that the basic NDP lacks a method for determining approved neighbors. If not secured, NDP is vulnerable to various attacks like redirection, stealing addresses, rejection of service advertisement, and parameter spoofing could occur. IPv6 Neighbor Discovery issues: The functionality of the IPv6 Neighbor Discovery protocol corresponds to the combination of the IPv4 protocols. IPv6 has some new vulnerabilities because of the structure of its headers. The security of IPv4 is roughly equivalent to IPv6. So, the same issues occur in IPv4 equivalent protocols. Solution Security issues of Neighbor Discovery in IPv6: IPv6 nodes use the Neighbor Discovery Protocol to discover other nodes on the link, to establish the link-layer addresses to find routers, and to maintain reachability information about the paths to active neighbors. It turns out that the basic NDP lacks a method for determining approved neighbors. If not secured, NDP is vulnerable to various attacks like redirection, stealing addresses, rejection of service advertisement, and parameter spoofing could occur. IPv6 Neighbor Discovery issues: The functionality of the IPv6 Neighbor Discovery protocol corresponds to the combination of the IPv4 protocols. IPv6 has some new vulnerabilities because of the structure of its headers. The security of IPv4 is roughly equivalent to IPv6. So, the same issues occur in IPv4 equivalent protocols.