Paper
26 June 2023 Analysis and countermeasures of campus network security protection under IPV6 architecture
Shaoqiang Li, Guangyu Wu, Allam Maalla
Author Affiliations +
Proceedings Volume 12714, International Conference on Computer Network Security and Software Engineering (CNSSE 2023); 1271405 (2023) https://doi.org/10.1117/12.2683180
Event: Third International Conference on Computer Network Security and Software Engineering (CNSSE 2023), 2023, Sanya, China
Abstract
With the development and popularization of IPv6 technology, cyber security is extremely important to national security. The evolution of campus network architecture to IPv6 has become an unstoppable trend, but we do not know much about the access security issues under IPv6 architecture. There are some security threats in IPv6 campus network, such as address acquisition spoofing, address resolution spoofing and flooding attack. In this paper, SAVI technology is proposed to solve the security problem of address acquisition spoofing network in DHCPv6 and SLAAC address acquisition mode under IPv6 architecture.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Shaoqiang Li, Guangyu Wu, and Allam Maalla "Analysis and countermeasures of campus network security protection under IPV6 architecture", Proc. SPIE 12714, International Conference on Computer Network Security and Software Engineering (CNSSE 2023), 1271405 (26 June 2023); https://doi.org/10.1117/12.2683180
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Information security

Internet

Packet switching

Computer security

Neodymium

Analytical research

RELATED CONTENT

ASN reputation system model
Proceedings of SPIE (May 14 2015)
Improved security monitoring method for network bordary
Proceedings of SPIE (March 20 2013)
Application of IPsec to teleradiology
Proceedings of SPIE (July 18 1999)
Extending key sharing how to generate a key tightly...
Proceedings of SPIE (April 18 2006)

Back to Top