ENGLISH / MAGYAR
Kövess
minket

Vulnerability Analysis of IPv6 Transition Technologies

2020-2021/I.
Dr. Lencse Gábor

The topic is for MSc students on English programs. (Angol nyelvű MSc képzés hallgatói számára szóló téma.)

The deployment of IPv6 will last for years or perhaps decades. IPv4 and IPv6 co-exist and they need to co-operate during the transition period. IETF has standardized a high number of IPv6 transition technologies, which enable communication in various scenarios despite the incompatibility of IPv4 and IPv6 [1]. They involve several security vulnerabilities, too. We have developed a methodology, which can be used to discover the security vulnerabilities of the different IPv6 transition technologies and their most important implementations efficiently [2].

The applicant should perform the following tasks:

  • Learn the methodology described in [2].
  • Select a few technologies and their implementations for security analysis.
  • Study the operation of the selected technologies (e.g. in virtual environment).
  • Perform the security analysis of the selected technologies both in theory (using their DFD-s to discover potential vulnerabilities) and in practice (using some free software implementations to discover their actual vulnerabilities).
  • Make suggestions for the elimination or at least mitigation of some of the discovered vulnerabilities.

Multiple students may register for this topic. The students may work together and support each other, but each student has to select his own technologies and implementations for security analysis.

This topic is suitable for a presentation at the Students' Scientific Conference (TDK) and/or writing an MSc final project thesis, and the topic is worth choosing, if you have such intention. If the quality of the work is good enough, then the supervisor plans to publish a common paper with the student, which can be a significant advantage for the student (e.g. in case of PhD studies).

References:
[1] G. Lencse and Y. Kadobayashi, "Comprehensive Survey of IPv6 Transition Technologies: A Subjective Classification for Security Analysis"
IEICE Transactions on Communications, vol. E102-B, no.10, pp. 2021-2035. DOI: 10.1587/transcom.2018EBR0002 http://www.hit.bme.hu/~lencse/publications/e102-b_10_2021.pdf  
[2] G. Lencse and Y. Kadobayashi, "Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64", Computers & Security (Elsevier), vol. 77, no. 1, pp. 397-411, August 1, 2018, DOI: 10.1016/j.cose.2018.04.012 http://www.hit.bme.hu/~lencse/publications/ECS-2018-Methodology-revised.pdf

Required language skills: English
Further requirements: knowledge of computer networks, persistence in studying IETF RFCs and security forums, working with Linux


3
0