Toward a threat model for storage systems
Proceedings of the 2005 ACM workshop on Storage security and survivability
A Unified Threat Model for Assessing Threat in Web Applications
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
Practical packet analysis
IPv6 Security
Computer
The Design and Realization of the Packet Filter Firewall Based on Linux
IIS '09 Proceedings of the 2009 International Conference on Industrial and Information Systems
H6Proxy: ICMPv6 Weakness Analysis and Implementation of IPv6 Attacking Test Proxy
UIC-ATC '09 Proceedings of the 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing
Security Modeling and Analysis
IEEE Security and Privacy
Limitations of IPsec policy mechanisms
Proceedings of the 11th international conference on Security Protocols
Hi-index | 0.00 |
Handling Internet Control Message Protocol version 6 ICMPv6 vulnerabilities is among the challenges in securing the IPv6 deployment. Since ICMPv6 messages are crucial in IPv6 communications, this paper discusses the discovery of ICMPv6 vulnerabilities by producing a threat model of ICMPv6 vulnerabilities and proposing the use of Selective Filtering ICMPv6 Messages SF-ICMP6 to handle some of the vulnerabilities. An experiment was conducted to verify the threat model by observing and discussing the usage of ICMPv6 threat model together with SF-ICMP6. The findings showed that the attack derived in the threat model is possible and the countermeasure associated with it is appropriate. As for SF-ICMP6, selectively filtering messages should be enforced because different messages require filtering of different type and code. It is expected that with the use of threat model and SF-ICMP6, maintaining and securing ICMPv6 messages in IPv6 deployment is attainable.