- 【Updated on May 12, 2025】 Integration of CiNii Dissertations and CiNii Books into CiNii Research
- Trial version of CiNii Research Knowledge Graph Search feature is available on CiNii Labs
- 【Updated on June 30, 2025】Suspension and deletion of data provided by Nikkei BP
- Regarding the recording of “Research Data” and “Evidence Data”
Detecting the Auto-configuration Attacks on IPv4 and IPv6 Networks
Search this article
Description
Auto-configuration is a mechanism, which assigns IP address, default gateway address and DNS server address to a node for accessing to the network. On IPv4 network, auto-configuration is done by using DHCP protocol, but IPv6 network has two ways to assign auto-configuration information to a node, which are stateless address configuration by routers and stateful address configuration by DHCPv6 servers. On the auto-configuration phrase, some attackers may be able to inject a counterfeit information, which may cause DOS, DNS hijacking, and man-in-the-middle attack, to the client. In this paper, we propose a method to detect DHCP attack and man-in-the-middle attack both on IPv4 and IPv6 network by collecting and analyzing the auto-configuration phrase. This approach is also able to detect the location of attacker in the network, and also works for both of IPv4 network and IPv6 network.
Journal
-
- 法政大学大学院紀要. 情報科学研究科編
-
法政大学大学院紀要. 情報科学研究科編 10 1-6, 2015-03-24
法政大学大学院情報科学研究科
- Tweet
Details 詳細情報について
-
- CRID
- 1390853649760910080
-
- NII Article ID
- 120005620053
-
- NII Book ID
- AA12222297
-
- HANDLE
- 10114/10903
-
- ISSN
- 18810667
-
- Text Lang
- ja
-
- Article Type
- departmental bulletin paper
-
- Data Source
-
- JaLC
- IRDB
- CiNii Articles
-
- Abstract License Flag
- Allowed