CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Secure Communication Process between Two Versions of Internet Protocols

by Sandeep Shiravale, Sumedha Sirsikar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Number 7
Year of Publication: 2013
Authors: Sandeep Shiravale, Sumedha Sirsikar
10.5120/10649-5410

Sandeep Shiravale, Sumedha Sirsikar . Secure Communication Process between Two Versions of Internet Protocols. International Journal of Computer Applications. 64, 7 ( February 2013), 34-38. DOI=10.5120/10649-5410

@article{ 10.5120/10649-5410,
author = { Sandeep Shiravale, Sumedha Sirsikar },
title = { Secure Communication Process between Two Versions of Internet Protocols },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 64 },
number = { 7 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 34-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume64/number7/10649-5410/ },
doi = { 10.5120/10649-5410 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:15:47.971486+05:30
%A Sandeep Shiravale
%A Sumedha Sirsikar
%T Secure Communication Process between Two Versions of Internet Protocols
%J International Journal of Computer Applications
%@ 0975-8887
%V 64
%N 7
%P 34-38
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Network performance optimization, configuration depends on proper design of complete network. The network layer is concerned with getting packets from source all the way to destination. The packets may cross many networks to reach the destination. To achieve its goals, the network layer must know about the topology, communication subnets and the version of the IP addresses used. Considering the present scenario, we are using IP v4 which needs to communicate with IP v6. The present networks are using only IP version 4 it is necessary to design and deploy certain methods which will help in communicating with the future generation of IP addresses. The present applications are still using IP version 4 to communicate and hence it is necessary to securely migrate them with the latest IP version. We present a secure tunneling mechanism that has some advantages over the other models. The model discussed here can be used to establish hybrid communications between the two different versions of Internet protocol in both ways.

References
  1. J020 B. D. Cabrerat B. Ravichandran and Raman K. Mehra, " Statistical Traffic Modelling for Intrusion Detection" 0-7695-0728-WOO$-10. 00 0 2000 IEEE 466-473
  2. Wanming Luo, Baoping Yan , Xiaodong Li, Wei Mao "Network-Processor-Based IPv4/IPv6 Translator: Implementation and Fault Tolerance" Feb. 17-20, 2008 ICACT 2008 488
  3. Mohammadreza Ektefa "Intrusion Detection using Data Mining techniques" 978-1-4244-5651-2/10/$26. 00 ©2010 IEEE 200-203
  4. Shaneel Narayan(Member IEEE), Shailendra S. Sodhi, Paula R. Lutui, Kaushik J. Vijaykumar "Network Performance Evaluation of Routers in IPv4/IPv6 Environment A testbed analysis of software routers" 978-1-4244-5849-3/10/$26. 00 ©2010 IEEE
  5. Lee Ling , Kasmiran Jumari, Mahamod ismail and Khairil Anuar, Joong-Hee Leet, Jong-Hyouk Leet "Effective Value of Decision Tree with KDD99 Intrusion Detection dataset for Intrusion Detection System" Feb. 17-20, 2008 ICACT 2008 1170-1175
  6. Yuhai Liu l, Hongbo Liu2 "The internet Traffic classification an online SVM approach"
  7. Chunling Wei "Research on Campus Network IPV6 Transition Technology". 978-0-7695-4480-9/11 $26. 00 © 2011 IEEE DOI 10. 1109/ISIE. 2011. 138
  8. Jiang Xie and"Case Study of Mobility Support for IPv4/IPv6 Transition Mechanisms over IPv6 Backbone networks"
  9. Thanh-Nghi Do " A Novel Speed-up SVM Algorithm for massive classification tasks" 978-1-4244-3279-8/08/$25. 00 © 2008 IEEE 215-220
  10. Debajyoti Mukhopadhayay, Byung-Jun-Oh, Sang-Heon Shim, Young-Chon Kim, "A Study on recent Approaches in Handling DDoS Attacks" Cornell University, The computing Research Repository 1012. 2979, Dec 2010
  11. Sheng Liu, Na Jiang "SVM Parameters optimization Algorithm and its Application" 978-1-4244-2632-4/08/$25. 00 IEEE 509-513
  12. Mahbod Tavallaee, Ebrahim Bagheri, wei Lu, and Ali A. Ghorbani "A detailed Analysis of the KDD CUP 99 Data Set" 978-1-4244-3764-1/09/$25. 00
Index Terms

Computer Science
Information Sciences

Keywords

IPv4 IPv6 Intrusion Detection System KDD dataset SVM Classifier