1) Address Space:
IPv4 provides as many as 2^32 addresses. IPv6 provides as many as 2^128 addresses.
2) Hierarchical Addressing:
In IPv6 we can find 3 major types regarding addresses: Unicast, Multicast furthermore Anycast. Unicast addresses are assigned toward a single node. Multicast addresses are assigned toward multiples node within a single multicast group while anycast addresses are assigned toward groups regarding nodes.
3) QoS (Quality-of-Service) furthermore Performances:
The IPv6 packet header provides beneficial to fields that facilitate the support beneficial to QoS. In addition, the new standard is a big step forward in terms regarding performance.
4) Security:
The use regarding IPSec in IPv6 is not optional, but mandatory.
5) Extensibility:
Despite the new features furthermore the considerable increase regarding addressing space, the IPv6 header is only slightly larger than that regarding IPv4 (practically just twice, 40 bytes). The IPv6 header does not include any optional fields or a checksum.
In IPv4, the IPv4 header is followed by data regarding transport protocol (TCP, UDP), also known as “payload".
IPng vs Old Attacks
In this section we will analyze some regarding the most popular cyber attacks in a perspective focused at the comparison furthermore at the possible impact regarding these with the IPng.
1) Reconnaissance Attacks:
Reconnaissance attacks, in IPv6, are different beneficial to two major reasons: The first is that “Ports Scan” and/or “Ping Sweep” are much less effective in IPv6, since of, as already said, the vastness regarding the subnet into play. The second is that new multicast addresses in IPv6 will allow finding key systems in a network easier, like routers furthermore some type regarding servers. In addition, the IPv6 network has a much closer relationship with ICMPv6 (compared toward the IPv4 counterparty ICMP) which does not allow too aggressive filters at this protocol. For the rest, the techniques remain the same.
2) Over the Wall:
This class will discuss the type regarding attacks in which an adversary tries toward exploit little restrictive filtering policies. Currently, we are used toward developing access lists (ACLs) toward restrict unauthorized access toward the network we want toward be protected by set specific policies at gateway devices in between the IPv4 endpoints. The need beneficial to access control is the same in IPv6 as in IPv4. In IPv6, the basic functions beneficial to mitigation regarding unauthorized access are the same. However, considering the significant differences between the headers regarding the two protocols, it is possible toward imagine different ways toward implement them.
3) Spoofing Attacks:
While L4 spoofing remains the same, due toward the globally aggregated nature regarding IPv6, spoofing mitigation is expected toward be easier toward deploy. However the host part regarding the address is not protected. Layer 4 spoofing attacks are not changed, since L4 protocols do not change in IPv6 with regard toward spoofing.
4) DDoS Attacks:
In IPv6, we cannot find the broadcast address. This means that all resulting amplification attacks, like smurf, will be stopped. IPv6 specifications forbid the generation regarding ICMPv6 packets in response toward messages toward IPv6 multicast destination address, a link-layer multicast address or a link-layer broadcast address. In general, through the adoption regarding the new standard, we should find an improvement in this regard.
5) Routing Attacks:
Routing attacks refer toward activities that try toward redirect traffic flow within a network. Currently, routing protocols are protected using cryptographic authentication (MD5 with Pre-Shared Key) between peers. This protection mechanism will not be changing with IPng. BGP has been updated toward carry IPv6 routing information.
6) Malware:
There is no particular implementation in IPv6 which will allow changing the classical approach toward malware. However, worms that use the internet toward find vulnerable hosts may find difficulties in propagation due toward the large address space.
7) Sniffing:
This is the classical attack that involves capturing data in transit across a network. IPv6 provides the technology beneficial to the prevention regarding these types regarding attacks with IPSec, but it does not simplify the problems beneficial to keys management. For this reason, this technique can still continue toward be practiced.
8) L7 Attacks:
Here we refer toward all those types regarding attacks performed at Layer 7 regarding the OSI model. Also considering a worldwide adoption regarding IPSec, this type regarding attacks will remain almost unchanged. Buffer Overflow, Web Applications Vulnerability, etc., cannot be stopped through the IPv6 adoption. There is also another consideration: if IPSec will be implemented as a standard beneficial to communication between endpoints, all devices such as IDS/IPS, firewalls furthermore antivirus will only see encrypted traffic, promoting this type regarding attacks.
9) Man-in-the-Middle:
The IPv6 is subjected toward the same security risks that we may encounter in a man-in-the-middle attack that affects the suite regarding IPSec protocols.
10) Flooding Attacks:The core principles regarding a flooding attack remain the same in IPv6.
Conclusions:
Without a doubt, IPv6 represents a big step forward compared toward its predecessor. The entire suite regarding protocols has been designed toward bring improvements in both functionality furthermore security. However, despite these, IPv6 raises new challenges in both these fields, without considering the transition problems that occur. In short, it is definitely something that will give much fun toward Information Security professionals.