Distributed Security Policy For Ipv6 Deployment
Distributed Security Policy For Ipv6 Deployment
Distributed Security Policy For Ipv6 Deployment
I. INTRODUCTION
Nowadays, Internet usage is rising hastily together with the
growth in technology. Internet can communicate nodes with
each other in a widespread area. The exhaustion of the IPv4
allocation pool has been an anxiety when the Internet began to
practise extraordinary expansion. Furthermore, current news
stated that the IPv4 has been declared totally diminished by
2011 as in [1].
To overcome the IPv4 depletion problem, IETF has
introduced an Internet Protocol version 6 (IPv6) in 1995. IPv6
addressing uses 128-bits, making almost anything in the world
can be assigned an IPv6 address and makes communication
between every single user to another a possibility. Besides,
resolving the IPv4 address depletion, IPv6 permits security
enhancement and offers an extra extensible and simpler
header as in [2].
120
121
122
V. RELATED WORKS
Security policies can offer enterprises numerous utilities
such as performing company security risk evaluations,
performing technical weaknesses evaluations, encouraging
and sustaining enterprise policies, security rules, procedures
and strategies and examining for fulfilment as in [11].
Security policies for IPv4 cannot be applied in IPv6
environment. Moreover, clients and tools in both networks
begin to be changing, thus when deploying IPv6 networks,
123
VI. CONCLUSIONS
This paper highlights the distributed firewall technique and
respective policies for securing the IPv6 deployment in the
enterprise networks which include the aspect of green
computing. Since enterprises may have branches and
counterparts all over the region, their policies will possibly be
distributed among these sub networks. An enterprise requires
a complete structure for the consistent handling of all security
aspects.
Security considerations and protection mechanisms must be
part of deployment plans for enterprises network. Hence,
[11]
ACKNOWLEDGMENT
This work was sustained in part by the Fundamental
Research Scheme Grant (FRGS), code project: 600RMI/SSP/FRGS 5/3/Fsp (54/2010). We would like to thank
the reviewers, participants of the research project and other
individuals who have indirectly contributed to this research.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[12]
[13]
[14]
(2011)
The
NRO
website.
[Online].
Available:
http://www.nro.net/news/ipv4-free-pool-depleted
B. J. Nikkel, "An introduction to investigating IPv6 networks," The
International Journal of Digital Forensics and Incident Response, vol.
4, 2007.
R. Hunt, "Internet/Intranet firewall security--policy, architecture and
transaction services," Computer Communications, vol. 21, pp. 11071123, 1998.
E. DurdagI and A. Buldu, "IPV4/IPV6 security and threat
comparisons," Procedia - Social and Behavioral Sciences, 2010, vol. 2,
pp. 5285-5291.
X. Ou, S. Govindavajhala, and A. Appel, "Network security
management with high-level security policies," 2010.
A. Ghosh, "In cloud computing we trust - but should we?," in Security
& Privacy. vol. 8 USA: IEEE Computer and Reliability Societies, 2010,
p. 14.
S. Ioannidis, "Security policy consistency and distributed evaluation in
heterogeneous environments," PhD. Computer and Information
Science. dissertation, University of Pennsylvania, Philadelphia, USA,
2005.
A. D. Keromytis, S. Ioannidis, M. B. Greenwald, J. M. Smith, "The
STRONGMAN Architecture," DARPA Information Survivability
Conference and Exposition, vol. I, p. 178, 2003.
I. Sotiris, D. K. Angelos, M. B. Steve, and M. S. Jonathan,
"Implementing a distributed firewall," in Proceedings of the 7th ACM
conference on Computer and communications security Athens, Greece:
ACM, 2000.
S.-C. Chou and C.-H. Huang, "An extended XACML model to ensure
secure information access for web services," Journal of Systems and
Software, vol. 83, pp. 77-84, 2009.
J. Palet, A. Vives, G. Martinez, and A. Gomez, "IPv6 Distributed
Security Requirements," Internet Engineering Task Force InternetDraft, 2005.
B. Yair, M. Alain, N. Kobbi, and W. Avishai, "Firmato: A novel
firewall management toolkit," ACM Trans. Comput. Syst., vol. 22, pp.
381-420, 2004.
D. F. Ferraiolo and D. R. Kuhn, "Role-Based Access Controls," 15th
National Computer Security Conference, 1992, pp. pp. 554 - 563.
A. A. E. Kalam, R. E. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y.
Deswarte, A. Miege, C. Saurel, and G. Trouessin, "Organization based
access control," in Policies for Distributed Systems and Networks,
2003. Proceedings. POLICY 2003. IEEE 4th International Workshop
on, 2003, pp. 120-131.
124