Abstract: The fast growth of the Internet and technology has a serious impact on our daily life. Almost everything around us has become connected to the Internet computers, appliances, medical devices, airplanes, and mobile devices. This rapid growth of connectivity has helped to develop the IPv6 to cover a numerous number of IP address and provide new services. The deployment of IPv6 provides many enhancements to the Internet infrastructure such as enhancing routing speed, simplicity, quality of service and security. However, it also brings new security concerns and challenges that result from the new transition between IPv4 and IPv6 as long as security issues that specifically related …show more content…
Therefore, both IPv4 and IPv6 coexist in today Internet, and there are many different transition mechanisms that support their working and help to make them compatible together. Some of these transition mechanisms that support both IPv4 and IPv6 such as, tunneling and dual-stack configurations, have some security consequences. Also, many of the network devices such as IDS (intrusion detection system), IPS (intrusion prevention system), and firewalls require a special security mechanism to support and accept this …show more content…
Intrusion Detection Systems Intrusion Detection Systems (IDS), also a crucial mechanism of any network infrastructure. They monitor and analyze the incoming and outgoing network traffic based on its suspicious behavior or based on unauthorized signature. IDS can be either host-based intrusion detection system (HIDS) or network-based intrusion detection system (NIDS). The HIDS system monitors the traffic and protects a single host, while NIDS monitors and analyzes the traffic on a whole network with its connected hosts simultaneously. In IPv4 networks, the policies of IDS can be automated, so any suspicious behavior or intrusion attempt will be recognized immediately and logged by HIDS or NIDS and the administrator will be warned. IPv6 provides many different new headers and extensions such as Hop-by-Hop, Routing, Fragment, Destination Options, Authentication, and Encapsulation Security payload. Unfortunately, must of the IDSs don’t support these new headers and extensions of IPv6 and some of them might be unaware of them. Also, IDS for IPv6 network must support and recognize 6to4 tunneled traffic and tie dual-stack nodes.
V.