Please use this identifier to cite or link to this item: https://scholarhub.balamand.edu.lb/handle/uob/4014
DC FieldValueLanguage
dc.contributor.advisorHaddad, Nicolas K.en_US
dc.contributor.authorGhalloub, Kamalaen_US
dc.date.accessioned2020-12-23T14:39:50Z-
dc.date.available2020-12-23T14:39:50Z-
dc.date.issued2018-
dc.identifier.urihttps://scholarhub.balamand.edu.lb/handle/uob/4014-
dc.descriptionIncludes bibliographical references (p. 73-79).en_US
dc.descriptionSupervised by Dr. Nicolas Haddad.en_US
dc.description.abstractWith the Internet growth, the shift to a newer IP protocol version is now unavoidable and really crucial. The exhaustion of the IPv4 addresses has urged the start of the IPv6 transition. The main goal of the transition is to provide the users with an uninterrupted availability; the IPv4 and IPv6 protocols are not compatible, one cannot directly replace the other, which is why they have to exist side-by-side for a considerable period of time. Many transitioning procedures are recommended to make the transition less troubling, however these procedures are extremely problematic. On the other hand, from the security point of view, the IPv6 protocol has indeed solved many of the IPv4 vulnerabilities, however not all of the IPv4 security attacks were tackled by IPv6. In fact, the IPv6 protocol has introduced many security exposures, especially with the existence of complications that the transitional techniques create. These concerns have made the IPv6 protocol in urgent need of many security defense layers, and new, and advanced, countermeasures. This thesis explains the IPv6 protocol features, and how it differs from the IPv4 protocol. It also presents the concepts behind each transitional procedure in the third chapter, and studies the disadvantage, and benefit, of each technique. Then, in the fourth chapter, the study displays the security improvements the IPv6 protocol has accomplished over the IPv4 protocol, and the concerns it has generated. Some recommendations are also suggested on how to make the IPv6 protocol more secure. Finally, after comparing all transitioning techniques, the best technique is proposed, and future research subjects are proposed to help enhance and correct the IPv6 protocol, and make it more reliable.en_US
dc.description.statementofresponsibilityby Kamala Ghallouben_US
dc.format.extentxiii, 79 p. :ill., tables ;30 cmen_US
dc.language.isoengen_US
dc.rightsThis object is protected by copyright, and is made available here for research and educational purposes. Permission to reuse, publish, or reproduce the object beyond the personal and educational use exceptions must be obtained from the copyright holderen_US
dc.subject.lcshComputer networksen_US
dc.subject.lcshTCP/IP (Computer network protocol)en_US
dc.titleThe current state of IPv6 : transition and securityen_US
dc.typeThesisen_US
dc.contributor.departmentDepartment of Computer Engineeringen_US
dc.contributor.facultyFaculty of Engineeringen_US
dc.contributor.institutionUniversity of Balamanden_US
dc.date.catalogued2018-06-11-
dc.description.degreeMS in Computer Engineeringen_US
dc.description.statusPublisheden_US
dc.identifier.ezproxyURLhttp://ezsecureaccess.balamand.edu.lb/login?url=http://olib.balamand.edu.lb/projects_and_theses/GP-CoE-91.pdfen_US
dc.identifier.OlibID184598-
dc.provenance.recordsourceOliben_US
Appears in Collections:UOB Theses and Projects
Show simple item record

Record view(s)

185
checked on Nov 21, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.