Skip to main content

Security Considerations for Intrinsic Monitoring within IPv6 Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5843))

Abstract

Intrinsic Monitoring is a method of collecting and disseminating node specific monitoring data throughout an IPv6 network by using the IPv6 extension headers as a carrier medium. The advantages of such a monitoring mechanism can be invaluable to a network operator, offering a wide range of performance and accuracy enhancements over traditional SNMP based or active probing based approaches. This paper discusses previous proposals related to Intrinsic Monitoring and highlights a number of security considerations that must first be resolved for such an approach to be deployable within an operational IP network. The paper offers initial contributions towards addressing these challenges.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Toutain, L., Durand, A.: Ipv6 traceroute option, IPv6 Working Group Internet Draft (June 1997)

    Google Scholar 

  2. Kaufman, C.: Internet Key Exchange (IKEv2) Protocol, RFC 4306 (Proposed Standard), Updated by RFC 5282 (December 2005)

    Google Scholar 

  3. Kent, S.: IP Authentication Header, RFC 4302 (Proposed Standard) (December 2005)

    Google Scholar 

  4. kent, S.: IP Encapsulating Security Payload (ESP), RFC 4303 (Proposed Standard) (December 2005)

    Google Scholar 

  5. Kent, S., Seo, K.: Security Architecture for the Internet Protocol, RFC 4301 (Proposed Standard) (December 2005)

    Google Scholar 

  6. Kitamura, H.: Connection/link status investigation (csi) for ipv6 hop-by-hop option and icmpv6 messages extension, Internet Draft, Work in Progress (1999)

    Google Scholar 

  7. Crocker, J.B.M., Lazarou, G., Picone, J.: A bandwidth determination method for ipv6-based networks. International Journal of Computers and Applications (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shi, L., Davy, A. (2009). Security Considerations for Intrinsic Monitoring within IPv6 Networks. In: Nunzi, G., Scoglio, C., Li, X. (eds) IP Operations and Management. IPOM 2009. Lecture Notes in Computer Science, vol 5843. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04968-2_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04968-2_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04967-5

  • Online ISBN: 978-3-642-04968-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics