An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali

Enterprises are required to utilize Internet Control Message Protocol version 6 (ICMPv6) when IPv6 is deployed. In IPv4, Internet Control Message Protocol (ICMP) is aggressively filtered by a network administrator while in IPv6, 1CMPv6 messages cannot be aggressively filtered due to the function of...

Full description

Bibliographic Details
Main Author: Wan Ali, Wan Nor Ashiqin
Format: Thesis
Language:English
Published: 2015
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/15285/
_version_ 1848803704631721984
author Wan Ali, Wan Nor Ashiqin
author_facet Wan Ali, Wan Nor Ashiqin
author_sort Wan Ali, Wan Nor Ashiqin
building UiTM Institutional Repository
collection Online Access
description Enterprises are required to utilize Internet Control Message Protocol version 6 (ICMPv6) when IPv6 is deployed. In IPv4, Internet Control Message Protocol (ICMP) is aggressively filtered by a network administrator while in IPv6, 1CMPv6 messages cannot be aggressively filtered due to the function of ICMPv6 message. ICMPv6 security risks increase when ICMPv6 threats and vulnerabilities are exploited. Thus, it is very crucial for enterprises to address the issues. In practice, network researchers must review several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6 vulnerabilities. Overlooking any of these issues will jeopardize the security of ICMPv6. Currently, with the absence of ideal ICMPv6 threat model to identify and trace ICMPv6 threats, the possibility for a network to be attacked may increase. Therefore, this research aims to design and propose ICMPv6 threat model by applying the threat modeling steps. Then, attack scenario testing was conducted to validate the significance of the ICMPv6 threat model. While conducting the testing, !Pv6-Filtering Prototype System (I6-FPS) was developed to overcome the deficiency and limited filtering tools that supported IPv6. I6-FPS is used to automate and simplify the writing of IPv6 filtering rules (ip6tables) and it was developed using PHP5 and Shell script languages. Overall, this research revealed that ICMPv6 threat model and 16-FPS are significant in the initial phase of securing IPv6 deployment With the ICMPv6 threat model, enterprises are able to trace and tackle ICMPv6 threats and vulnerabilities in the IPv6 deployment. The ICMPv6 threat model has the potential to be extended by including more threats and vulnerabilities since the threat model is considered to be an iterative procedure that could be enhanced and developed over time
first_indexed 2025-11-14T21:43:29Z
format Thesis
id uitm-15285
institution Universiti Teknologi MARA
institution_category Local University
language English
last_indexed 2025-11-14T21:43:29Z
publishDate 2015
recordtype eprints
repository_type Digital Repository
spelling uitm-152852022-03-09T07:42:54Z https://ir.uitm.edu.my/id/eprint/15285/ An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali Wan Ali, Wan Nor Ashiqin Neural networks (Computer science) Web servers. Internet Enterprises are required to utilize Internet Control Message Protocol version 6 (ICMPv6) when IPv6 is deployed. In IPv4, Internet Control Message Protocol (ICMP) is aggressively filtered by a network administrator while in IPv6, 1CMPv6 messages cannot be aggressively filtered due to the function of ICMPv6 message. ICMPv6 security risks increase when ICMPv6 threats and vulnerabilities are exploited. Thus, it is very crucial for enterprises to address the issues. In practice, network researchers must review several resources to identify ICMPv6 related attacks occurring due to the exploitation of ICMPv6 vulnerabilities. Overlooking any of these issues will jeopardize the security of ICMPv6. Currently, with the absence of ideal ICMPv6 threat model to identify and trace ICMPv6 threats, the possibility for a network to be attacked may increase. Therefore, this research aims to design and propose ICMPv6 threat model by applying the threat modeling steps. Then, attack scenario testing was conducted to validate the significance of the ICMPv6 threat model. While conducting the testing, !Pv6-Filtering Prototype System (I6-FPS) was developed to overcome the deficiency and limited filtering tools that supported IPv6. I6-FPS is used to automate and simplify the writing of IPv6 filtering rules (ip6tables) and it was developed using PHP5 and Shell script languages. Overall, this research revealed that ICMPv6 threat model and 16-FPS are significant in the initial phase of securing IPv6 deployment With the ICMPv6 threat model, enterprises are able to trace and tackle ICMPv6 threats and vulnerabilities in the IPv6 deployment. The ICMPv6 threat model has the potential to be extended by including more threats and vulnerabilities since the threat model is considered to be an iterative procedure that could be enhanced and developed over time 2015 Thesis NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/15285/1/TM_WAN%20NOR%20ASHIQIN%20WAN%20ALI%20CS%2015_5.pdf Wan Ali, Wan Nor Ashiqin (2015) An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali. (2015) Masters thesis, thesis, Universiti Teknologi MARA. <http://terminalib.uitm.edu.my/15285.pdf>
spellingShingle Neural networks (Computer science)
Web servers. Internet
Wan Ali, Wan Nor Ashiqin
An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali
title An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali
title_full An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali
title_fullStr An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali
title_full_unstemmed An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali
title_short An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali
title_sort icmpv6 threat model / wan nor ashiqin wan ali
topic Neural networks (Computer science)
Web servers. Internet
url https://ir.uitm.edu.my/id/eprint/15285/