It is no secret that the pool of public internet addresses available with Internet Protocol version Four (IPv4) is gone. (Morphy, 2011) Thus the migration to the more roomy Internet Protocol version Six (IPv6) has begun. This migration is a complex process including different security procedures and updates that require time and knowledge. This paper will dive into scientific writings, with databases like Scopus and IEEE, about various security risks in the IPv6 protocol such as tunneling practices, router issues and issues with Internet Protocol Security (IPsec). This paper will overview security practices to better clarify common vulnerabilities in IPv6. While some configurations cause issues with host safety, it is commonly noted that due to user error most of the attacks escalate more than they should. Network professionals should be informed about IPv6 security issues in order to best protect a system. Information on IPv6 security risks is crucial to protecting against an attack before it happens and minimizing damage when real time attacks take place.
"Network Security: Internet Protocol Version Six Security,"
S&T’s Peer to Peer: Vol. 1
, Article 3.
Available at: http://scholarsmine.mst.edu/peer2peer/vol1/iss2/3