dcsimg

Find an IT Download

Malware Tunneling in IPv6

IPv6 can be misused to deliver malware in a way that eludes detection by firewalls or intrusion detection systems (IDS) not configured to recognize IPv6 traffic. This guide addresses minimizing risks associated with malware tunneling in IPv6.


147 KB | 3 files | null DOC,null PDF

The Internet Protocol, version 6 (IPv6) was designed to alleviate the address space limitations of IPv4 and provide additional security and routing capabilities. The protocol itself, however, can be misused to deliver malware in a way that eludes detection by firewalls or intrusion detection systems (IDS) not configured to recognize IPv6 traffic. This problem can be amplified in cases where malware is used to reconfigure vulnerable hosts to allow IPv6 traffic. This guide addresses minimizing risks associated with malware tunneling in IPv6.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Malware Tunneling in IPv6.pdf