Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.
Digital Object Identifier (DOI) : 10.14569/IJACSA.2015.060109
Article Published in International Journal of Advanced Computer Science and Applications(IJACSA), Volume 6 Issue 1, 2015.
Abstract: IPv4 address pool is already exhausted; therefore, the change to use IPv6 is eventually necessary to give us a massive address pool. Although IPv6 was built with security in mind, extensive research must be done before deploying IPv6 to ensure the protection of security and privacy. This paper firstly presents the differences between the old and new IP versions (IPv4 and IPv6), and how these differences will affect the attacks, then the paper will show how the attacks on IPv4 and IPv6 will remain mostly the same; furthermore, the use of IPv6 will give rise to new types of attacks and change other types’ behavior.
Firas Najjar and Homam El-Taj, “Ipv6 Change Threats Behavior” International Journal of Advanced Computer Science and Applications(IJACSA), 6(1), 2015. http://dx.doi.org/10.14569/IJACSA.2015.060109