DSpace Repository

Covert channel in IPv6 Destination option Extension header

Show simple item record

dc.contributor.author Mavani, Monali
dc.date.accessioned 2023-01-24T09:10:49Z
dc.date.available 2023-01-24T09:10:49Z
dc.date.issued 2014
dc.identifier.uri https://ieeexplore.ieee.org/document/6839262/keywords#keywords
dc.identifier.uri http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8690
dc.description.abstract IPv6 is next generation Internet protocol whose market is going to increase as IPv4 addresses are exhausted and more mobile devices are attached to Internet. The experience with IPv6 protocol is less as its deployment is slow. So there are many unknown threats possible in IPv6 networks. One such threat addressed in this paper is covert communication in the network. Covert channel is way of communicating classified information. In network it is done by network protocol's control fields. Destination option Extension header of IPv6 is used to pass secret information which is shown experimentally in real test network set up. For creation of attack packets Scapy-Python based API is used. Covert channel due to unknown option and nonzero padding in PadN option is shown. Their detection is also proposed and detector logic is implemented using shell scripting and C programming. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.subject Computer Science en_US
dc.subject Detectors en_US
dc.subject Protocols en_US
dc.subject IP networks en_US
dc.subject Operating systems en_US
dc.subject Information technology en_US
dc.title Covert channel in IPv6 Destination option Extension header en_US
dc.type Article en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account