1,939
29
Case Study, 2 pages (300 words)

Overcoming the challenge case study example

IPV4 has relied on ICMP throughout its functioning years. The introduction of IPV6 has further increased the reliance over ICMP. It provides number of additional features as compared to its predecessors. Yet there are number of security concerns attached with it.
IPSec and ICMP do not go along too well in case of IPv6. Manual configuration is desired in this regard. Absence of IPSec makes ICMP less potent against any external threat and makes it no more effective than IPV4 network. In case of IPV6, built in ICMP can prevent the challenges that are faced otherwise. Ping of Death, ping flood are two vulnerabilities of same kind (Javvin, 2007, 236)

The challenge of ICMP vulnerability can be overcome via usage of SeND (Rooney & Dooley, 2013, 33), which provides an alternate to using IPSec and thereby secure NDP and neighbor location process. Although SeND is not compatible with all hardware devices at present. Secure Neighbor Discovery function is another backup action that allows preventing any loophole that may be caused by the ICMP and IPSec compatibility factor.
The incompatibility of the two in turn impacts the presence and proper working of SLAAC. As a result of this, spam, unauthorized and impersonated entry attempts are made with little protection of the network. Router advertisement messages can be faked for original messages.
ICMP vulnerability can result in barring of the host from acquiring a correct address that is directed towards the destination. Hence if the ICMP security concern is handled properly Neighbor determination and fragmentation are two functions that can be effectively implemented through ICMP. Inserting of cryptographic generated address allows for more secure operations and reduced ICMP security vulnerability concerns. Sorting out the manual configuration is another factor that can strengthen the ICMP usage case in IPV6 network.

References:

Graziani, R. (2012). IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6. Cisco Press.
Javvin. (2007). Network Dictionary. Javvin Technologies Inc.
Rooney, T., & Dooley, M. (2013). IPv6 Deployment and Management. John Wiley & Sons.

Thank's for Your Vote!
Overcoming the challenge case study example. Page 1
Overcoming the challenge case study example. Page 2
Overcoming the challenge case study example. Page 3

This work, titled "Overcoming the challenge case study example" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Case Study

References

AssignBuster. (2021) 'Overcoming the challenge case study example'. 14 November.

Reference

AssignBuster. (2021, November 14). Overcoming the challenge case study example. Retrieved from https://assignbuster.com/overcoming-the-challenge-case-study-example/

References

AssignBuster. 2021. "Overcoming the challenge case study example." November 14, 2021. https://assignbuster.com/overcoming-the-challenge-case-study-example/.

1. AssignBuster. "Overcoming the challenge case study example." November 14, 2021. https://assignbuster.com/overcoming-the-challenge-case-study-example/.


Bibliography


AssignBuster. "Overcoming the challenge case study example." November 14, 2021. https://assignbuster.com/overcoming-the-challenge-case-study-example/.

Work Cited

"Overcoming the challenge case study example." AssignBuster, 14 Nov. 2021, assignbuster.com/overcoming-the-challenge-case-study-example/.

Get in Touch

Please, let us know if you have any ideas on improving Overcoming the challenge case study example, or our service. We will be happy to hear what you think: [email protected]