Please use this identifier to cite or link to this item:
https://scholarhub.balamand.edu.lb/handle/uob/4014
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Haddad, Nicolas K. | en_US |
dc.contributor.author | Ghalloub, Kamala | en_US |
dc.date.accessioned | 2020-12-23T14:39:50Z | - |
dc.date.available | 2020-12-23T14:39:50Z | - |
dc.date.issued | 2018 | - |
dc.identifier.uri | https://scholarhub.balamand.edu.lb/handle/uob/4014 | - |
dc.description | Includes bibliographical references (p. 73-79). | en_US |
dc.description | Supervised by Dr. Nicolas Haddad. | en_US |
dc.description.abstract | With the Internet growth, the shift to a newer IP protocol version is now unavoidable and really crucial. The exhaustion of the IPv4 addresses has urged the start of the IPv6 transition. The main goal of the transition is to provide the users with an uninterrupted availability; the IPv4 and IPv6 protocols are not compatible, one cannot directly replace the other, which is why they have to exist side-by-side for a considerable period of time. Many transitioning procedures are recommended to make the transition less troubling, however these procedures are extremely problematic. On the other hand, from the security point of view, the IPv6 protocol has indeed solved many of the IPv4 vulnerabilities, however not all of the IPv4 security attacks were tackled by IPv6. In fact, the IPv6 protocol has introduced many security exposures, especially with the existence of complications that the transitional techniques create. These concerns have made the IPv6 protocol in urgent need of many security defense layers, and new, and advanced, countermeasures. This thesis explains the IPv6 protocol features, and how it differs from the IPv4 protocol. It also presents the concepts behind each transitional procedure in the third chapter, and studies the disadvantage, and benefit, of each technique. Then, in the fourth chapter, the study displays the security improvements the IPv6 protocol has accomplished over the IPv4 protocol, and the concerns it has generated. Some recommendations are also suggested on how to make the IPv6 protocol more secure. Finally, after comparing all transitioning techniques, the best technique is proposed, and future research subjects are proposed to help enhance and correct the IPv6 protocol, and make it more reliable. | en_US |
dc.description.statementofresponsibility | by Kamala Ghalloub | en_US |
dc.format.extent | xiii, 79 p. :ill., tables ;30 cm | en_US |
dc.language.iso | eng | en_US |
dc.rights | This object is protected by copyright, and is made available here for research and educational purposes. Permission to reuse, publish, or reproduce the object beyond the personal and educational use exceptions must be obtained from the copyright holder | en_US |
dc.subject.lcsh | Computer networks | en_US |
dc.subject.lcsh | TCP/IP (Computer network protocol) | en_US |
dc.title | The current state of IPv6 : transition and security | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Department of Computer Engineering | en_US |
dc.contributor.faculty | Faculty of Engineering | en_US |
dc.contributor.institution | University of Balamand | en_US |
dc.date.catalogued | 2018-06-11 | - |
dc.description.degree | MS in Computer Engineering | en_US |
dc.description.status | Published | en_US |
dc.identifier.ezproxyURL | http://ezsecureaccess.balamand.edu.lb/login?url=http://olib.balamand.edu.lb/projects_and_theses/GP-CoE-91.pdf | en_US |
dc.identifier.OlibID | 184598 | - |
dc.provenance.recordsource | Olib | en_US |
Appears in Collections: | UOB Theses and Projects |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.