17.10.2014 Views

Crosby-Signed Thesis - Alliance Digital Repository

Crosby-Signed Thesis - Alliance Digital Repository

Crosby-Signed Thesis - Alliance Digital Repository

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

IMPACT OF IPV6 TRANSITION MECHANISMS ON THE NETWORK FORENSIC<br />

3<br />

While the new protocol has quietly penetrated the network environment, the academic<br />

and business communities have neglected research and development in this area. Despite<br />

consumer device support, network security vendors have been slow to support IPv6 in their<br />

products because low utilization rates make it difficult to realize a return on investment.<br />

Researchers have addressed general security in IPv6; however, they have neglected a technical<br />

discussion of the context and nature of the traffic. Attackers will exploit attack vectors that offer<br />

the greatest chance of success with the least chance of being discovered. The IPv6 protocol is<br />

available and can covertly traverse the network which opens up an opportunity that will lead to<br />

growth in IPv6 based attacks.<br />

Research Objective<br />

The primary objective of this study was to develop a practical methodology for<br />

investigating and analyzing transitional networks. To accomplish this goal, the study employed a<br />

qualitative method based on the active research methodology to evaluate the IPv6 transition<br />

mechanisms, operating systems, and attack vectors. First, the literature review enumerated<br />

current research in digital forensics, IPv6 transition mechanisms, operating system support, and<br />

IPv6 vulnerabilities. Second, a virtual lab environment was created and testing procedures were<br />

designed to answer the research sub-problems. Third, the procedures were implemented while<br />

the researcher recorded operating system states, tool output, and other observations. Finally, the<br />

discoveries and results were analyzed and distilled into three outputs that supported the proposed<br />

investigative methodology. First, the implications of IPv6 transition mechanisms on the digital<br />

forensics discipline were outlined. Second, a summary of the behaviors of each transition<br />

mechanism and operating system in the study was presented from the perspective of a forensic

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!