All
All

Malware Tunneling in IPv6

147 KB | 3 files | null DOC,null PDF

IPv6 can be misused to deliver malware in a way that eludes detection by firewalls or intrusion detection systems (IDS) not configured to recognize IPv6 traffic. This guide addresses minimizing risks associated with malware tunneling in IPv6.

The Internet Protocol, version 6 (IPv6) was designed to alleviate the address space limitations of IPv4 and provide additional security and routing capabilities. The protocol itself, however, can be misused to deliver malware in a way that eludes detection by firewalls or intrusion detection systems (IDS) not configured to recognize IPv6 traffic. This problem can be amplified in cases where malware is used to reconfigure vulnerable hosts to allow IPv6 traffic. This guide addresses minimizing risks associated with malware tunneling in IPv6.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Malware Tunneling in IPv6.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

US-CERT is charged with providing response support and defense against cyber attacks for the Federal Civil Executive Branch (.gov) and information sharing and collaboration with state and local government, industry and international partners. US-CERT interacts with federal agencies, industry, the research community, state and local governments, and others to disseminate reasoned and actionable cyber security information to the public.

All IT Downloads from US-CERT» | Visit US-CERT »
Related IT Downloads

Job Description: iOS Mobile Application Developer Job Description: iOS Mobile Application Developer

Use this sample job description to aid your search for qualified candidates or as a template for polishing your own resume....  More >>

Top 10 Sources of Firewall Blocks - October 2009 Top 10 Sources of Firewall Blocks - October 2009

This table is taken from Network Box's report on Globalization of Malware Production....  More >>

Guide to Intrusion Detection and Prevention Systems Guide to Intrusion Detection and Prevention Systems

IDPSs monitor your network and report possible attacks and threats....  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.