DSpace Repository

Covert channel in IPv6 Destination option Extension header

Show simple item record

dc.contributor.author Mavani, Monali
dc.date.accessioned 2024-05-08T06:59:53Z
dc.date.available 2024-05-08T06:59:53Z
dc.date.issued 2014
dc.identifier.uri https://ieeexplore.ieee.org/abstract/document/6839262
dc.identifier.uri http://dspace.bits-pilani.ac.in:8080/jspui/xmlui/handle/123456789/14762
dc.description.abstract IPv6 is next generation Internet protocol whose market is going to increase as IPv4 addresses are exhausted and more mobile devices are attached to Internet. The experience with IPv6 protocol is less as its deployment is slow. So there are many unknown threats possible in IPv6 networks. One such threat addressed in this paper is covert communication in the network. Covert channel is way of communicating classified information. In network it is done by network protocol's control fields. Destination option Extension header of IPv6 is used to pass secret information which is shown experimentally in real test network set up. For creation of attack packets Scapy-Python based API is used. Covert channel due to unknown option and nonzero padding in PadN option is shown. Their detection is also proposed and detector logic is implemented using shell scripting and C programming. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.subject Computer Science en_US
dc.subject IPv6 address en_US
dc.subject Extension Header en_US
dc.subject Covert Channel en_US
dc.subject Scapy en_US
dc.title Covert channel in IPv6 Destination option Extension header en_US
dc.type Article en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account