Towards the Security Analysis of the Five Most Prominent IPv4aaS Technologies
This paper surveys the five most important technologies for IPv4aaS (IPv4-as-a-Service), namely 464XLAT, DS-Lite (Dual-Stack Lite), lw4o6 (Lightweight 4over6), MAP-E and MAP-T. The aim of our effort is to identify the potential security issues within these technologies. We plan to perform their secu...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Széchenyi István University
2020-03-01
|
Series: | Acta Technica Jaurinensis |
Subjects: | |
Online Access: | https://acta.sze.hu/index.php/acta/article/view/530 |
id |
doaj-61b83eb4fc63496d8a67481a16e02881 |
---|---|
record_format |
Article |
spelling |
doaj-61b83eb4fc63496d8a67481a16e028812020-11-25T03:27:15ZengSzéchenyi István UniversityActa Technica Jaurinensis2064-52282020-03-01132859810.14513/actatechjaur.v13.n2.530530Towards the Security Analysis of the Five Most Prominent IPv4aaS TechnologiesAmeen Al-Azzawi0Department of Networked Systems and Services, Budapest University of Technology and Economics, Magyar tudósok körútja 2, H-1117 Budapest, HungaryThis paper surveys the five most important technologies for IPv4aaS (IPv4-as-a-Service), namely 464XLAT, DS-Lite (Dual-Stack Lite), lw4o6 (Lightweight 4over6), MAP-E and MAP-T. The aim of our effort is to identify the potential security issues within these technologies. We plan to perform their security analysis following the STRIDE approach, which stands for spoofing, tampering, repudiation, information disclosure, denial of service and elevation of privilege. We give a short introduction for the method. Within the five IPv4aaS technologies, we focus on 464XLAT, its architecture and operation. We construct a DFD diagram suitable for its security analysis according to the STRIDE methodology, thus making the first steps towards finding its potential vulnerabilities and seeking for their mitigations.https://acta.sze.hu/index.php/acta/article/view/530ipv6 transition technologiesdns64nat64security analysisstride464xlat |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ameen Al-Azzawi |
spellingShingle |
Ameen Al-Azzawi Towards the Security Analysis of the Five Most Prominent IPv4aaS Technologies Acta Technica Jaurinensis ipv6 transition technologies dns64 nat64 security analysis stride 464xlat |
author_facet |
Ameen Al-Azzawi |
author_sort |
Ameen Al-Azzawi |
title |
Towards the Security Analysis of the Five Most Prominent IPv4aaS Technologies |
title_short |
Towards the Security Analysis of the Five Most Prominent IPv4aaS Technologies |
title_full |
Towards the Security Analysis of the Five Most Prominent IPv4aaS Technologies |
title_fullStr |
Towards the Security Analysis of the Five Most Prominent IPv4aaS Technologies |
title_full_unstemmed |
Towards the Security Analysis of the Five Most Prominent IPv4aaS Technologies |
title_sort |
towards the security analysis of the five most prominent ipv4aas technologies |
publisher |
Széchenyi István University |
series |
Acta Technica Jaurinensis |
issn |
2064-5228 |
publishDate |
2020-03-01 |
description |
This paper surveys the five most important technologies for IPv4aaS (IPv4-as-a-Service), namely 464XLAT, DS-Lite (Dual-Stack Lite), lw4o6 (Lightweight 4over6), MAP-E and MAP-T. The aim of our effort is to identify the potential security issues within these technologies. We plan to perform their security analysis following the STRIDE approach, which stands for spoofing, tampering, repudiation, information disclosure, denial of service and elevation of privilege. We give a short introduction for the method. Within the five IPv4aaS technologies, we focus on 464XLAT, its architecture and operation. We construct a DFD diagram suitable for its security analysis according to the STRIDE methodology, thus making the first steps towards finding its potential vulnerabilities and seeking for their mitigations. |
topic |
ipv6 transition technologies dns64 nat64 security analysis stride 464xlat |
url |
https://acta.sze.hu/index.php/acta/article/view/530 |
work_keys_str_mv |
AT ameenalazzawi towardsthesecurityanalysisofthefivemostprominentipv4aastechnologies |
_version_ |
1724588724940963840 |