DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/xmlui/handle/123456789/8690
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMavani, Monali-
dc.date.accessioned2023-01-24T09:10:49Z-
dc.date.available2023-01-24T09:10:49Z-
dc.date.issued2014-
dc.identifier.urihttps://ieeexplore.ieee.org/document/6839262/keywords#keywords-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8690-
dc.description.abstractIPv6 is next generation Internet protocol whose market is going to increase as IPv4 addresses are exhausted and more mobile devices are attached to Internet. The experience with IPv6 protocol is less as its deployment is slow. So there are many unknown threats possible in IPv6 networks. One such threat addressed in this paper is covert communication in the network. Covert channel is way of communicating classified information. In network it is done by network protocol's control fields. Destination option Extension header of IPv6 is used to pass secret information which is shown experimentally in real test network set up. For creation of attack packets Scapy-Python based API is used. Covert channel due to unknown option and nonzero padding in PadN option is shown. Their detection is also proposed and detector logic is implemented using shell scripting and C programming.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subjectComputer Scienceen_US
dc.subjectDetectorsen_US
dc.subjectProtocolsen_US
dc.subjectIP networksen_US
dc.subjectOperating systemsen_US
dc.subjectInformation technologyen_US
dc.titleCovert channel in IPv6 Destination option Extension headeren_US
dc.typeArticleen_US
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.