Por favor, use este identificador para citar o enlazar este ítem: http://elartu.tntu.edu.ua/handle/lib/38462
Título : Дослідження рівня безпеки мережевого протоколу IPv6
Otros títulos : Research of security level for network protocol IPv6
Autor : Kumar, Vaibhav
Affiliation: ТНТУ ім. І. Пулюя, Факультет комп’ютерно-інформаційних систем і програмної інженерії, Кафедра комп’ютерних наук, м. Тернопіль, Україна
Bibliographic description (Ukraine): Kumar Vaibhav. Дослідження рівня безпеки мережевого протоколу IPv6 : кваліфікаційна робота освітнього рівня „Бакалавр“ за спеціальністю „122 – комп’ютерні науки“ / Kumar Vaibhav – Тернопіль : ТНТУ, 2022. – 75 с.
Fecha de publicación : 6-jul-2022
Submitted date: 23-jun-2022
Date of entry: 11-jul-2022
Country (code): UA
Place of the edition/event: ТНТУ ім. І.Пулюя, ФІС, м. Тернопіль, Україна
Supervisor: Шимчук, Григорій Валерійович
Committee members: Стадник, Наталія Богданівна
UDC: 004.04
Palabras clave : графи атак
attack graphs
інтернет протокол
internet Protocol
центральний процесор
central processor
альтернативна адреса
anycast
індивідуальна адреса
unicast
групова адреса
multicast
Resumen : The specification of the IPv6 network protocol is considered in the qualification work. These include basic aspects such as address space expansion, a new network layer header, and basic features (such as auto-configuration and use of the ICMPv6 protocol). In addition, a brief comparative description of IPv4 and IPv6 protocols is given. The stages of network design, in which different methods of security analysis and determination of the general level of security, which are based on quantitative and qualitative methods of risk analysis, can be used, are considered. Attack graphs provide an efficient way to model network attack scenarios, and CVSS's "Common Vulnerability Scoring System" provides numerical scores for each vulnerability. Taken together, these approaches can give an estimate of the level of security of a computer network.
Content: INTRODUCTION 8 1 ANALYSIS OF IPV6 NETWORK PROTOCOL SPECIFICATION 10 1.1 Addressing 10 1.2 Package title 13 1.3 Extension headers 14 1.4 ICMPv6 protocol 15 1.4.1 Error messages 16 1.4.2 Information messages 17 1.5 ND Protocol 17 1.5.1 Check the uniqueness of the address 18 1.6 Automatic adjustment 18 1.6.1 Automatic Adjustment (SLAAC) 19 1.6.2 Automatic configuration using DHCP 20 1.7 Methods of migration 22 1.7.1 Native protocols 22 1.7.2 Hybrid protocols 22 1.8 Conclusion to the first section 28 2 STUDY OF THE LEVEL OF SECURITY OF THE PROTOCOL 29 2.1 Deployment of the test laboratory 29 2.2 Conducting tests 33 2.2.1 Intelligence 33 2.2.2 Smurf attack 35 2.2.3 Use extension headers 36 2.2.4 Automatic configuration and ND protocol 42 2.2.5 Using DHCPv6 48 2.2.6 Methods of migration 52 2.3 Assess the level of security using an attack graph 53 2.4 Conclusion to the fourth section 60 3 LIFE SAFETY, BASICS OF LABOR PROTECTION 62 3.1 Basics of labor protection 62 3.1.1 Characteristics of the organization of production, technology in terms of labor protection 62 3.1.2 Legislation on labor protection in the field of information technology 64 3.2 Life safety 67 3.2.1 Analysis of harmful and dangerous factors 67 3.2.2 Engineering solution 69 3.2.3 Electrical safety 70 3.2.4 Fire safety 71 3.3 Conclusion to the third section 72 CONCLUSION 73 REFERENCES 74
URI : http://elartu.tntu.edu.ua/handle/lib/38462
Copyright owner: © Kumar Vaibhav, 2021
References (Ukraine): 1. Arbor Networks. Stattya Marc Eisenbarth [Elektronnyy resurs]: Rezhym dostupu: http://www.arbornetworks.com/asert/2014/08/ipv4–is–not–enough/ – Nazva z ekranu. Data perehlyadu – 3.12.2018 r. 2. IPv6 Readiness in the Communication Service Provider Industry. An Incognito Software Report, April 2014, 18 p. 3. Santosh Naidu P1, Amulya Patcha, IPv6: Threats Posed By Multicast Packets, Extension Headers and Their Counter Measures. IOSR Journal of Computer Engineering (IOSR–JCE), Nov. – Dec. 2013, 66–75 p. 4. Google Official Blog. Pid red. Lorenzo Colitti IPv6 Statistics [Bloh]: Rezhym dostupu: http://www.google.com/intl/en/ipv6/statistics/— Nazva z ekranu. Data perehlyadu – 3.12.2018 r. 5. Diane Teare. Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide Foundation learning for the ROUTE 642–902 Exam– Yndyanapolys: Cisco Press, 2004. 765 s. 6. RFC 2460 [Elektronnyy resurs]: Rezhym dostupu: https://tools.ietf.org/html /rfc2460 – Nazva z ekranu. Data perehlyadu – 4.4.2022 r. 7. RFC 4443 [Elektronnyy resurs]: Rezhym dostupu: https://tools.ietf.org/html /rfc4443 – Nazva z ekranu. Data perehlyadu – 4.4.2022 r. 8. RFC 4861 [Elektronnyy resurs]: Rezhym dostupu: https://tools.ietf.org/html /rfc4861 – Nazva z ekranu. Data perehlyadu – 4.4.2022 r. 9. RFC 4429 [Elektronnyy resurs]: Rezhym dostupu: https://tools.ietf.org/html/rfc4429 – Nazva z ekranu. Data perehlyadu – 4.04.2022 r. 10. Google Official Blog. Pid red. Lorenzo Colitti Access Google services over IPv6 [Bloh] : Rezhym dostupu: www.google.com/intl/en/ipv6/ — Nazva z ekranu. Data perehlyadu – 4.4.2022 r. 11. Gabi Nakibly Michael Arov “Routing Loop Attacks using IPv6 Tunnels”– 7 USENIX Association Berkeley, CA, USA, 2009, 7 p. 12. Sander Degen, Arjen Holtzer Testing the security of IPv6 implementations – Nederlandʺs, March 2014, 42 p. 13. Modely, postroennye s yspolʹzovanyem teoryy hrafov [Elektronnyy resurs].– Rezhym dostupu: http://inf–bez.ru/?p=762 – Nazva z ekranu. Data perehlyadu – 12.12.2018 r. 14. DSanPiN 3.3.2–007–98. Hihiyenichni vymohy do orhanizatsiyi roboty z vizualʹnymy displeynymy terminalamy elektronno–obchyslyuvalʹnykh mashyn\MOZ Ukrayiny–K.:1998.18s. 15. DSN 3.3.6.042–99 Sanitarni normy mikroklimatu vyrobnychykh prymishchenʹ – Kyyiv, 2000. 16. DBN–V.2.5–28–2006–Pryrodne i shtuchne osvitlennya. 17. DSN 3.3.6.037–99 Sanitarni normy vyrobnychoho shumu, ulʹtrazvuku ta infrazvuku. 18. Pravyla ulashtuvannya elektroustanovok PUE–2009. 19. NAPB B.03.002–2007. Normy opredelenyya katehoryy pomeshchenyy, zdanyy y naruzhnykh ustanovok po vzryvopozharnoy y pozharnoy opasnosty. 20. NPAOP 0.00–1.28–10 Pravyla okhorony pratsi pid chas ekspluatatsiyi elektronno–obchyslyuvalʹnykh mashyn.
Content type: Bachelor Thesis
Aparece en las colecciones: 122 — Компʼютерні науки (бакалаври)

Ficheros en este ítem:
Fichero Descripción Tamaño Formato  
ISN-42_Kumar Vaibhav.pdf1,67 MBAdobe PDFVisualizar/Abrir


Los ítems de DSpace están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.

Herramientas de Administrador